09.02.2014 Views

Windows sysinternals

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Basic Connectivity<br />

Chapter 6 Pstools 175<br />

Unless you specify an IP address, name resolution needs to work. If DNS is not available,<br />

NetBIOS over TCP (NBT) might suffice, but it requires that 137 UDP, 137 TCP, 138 UDP, and<br />

139 TCP be opened on the firewall of the target system.<br />

Some of the utilities require that the administrative Admin$ share be available. This requires<br />

that file and print sharing be enabled (the Workstation service locally and the Server service<br />

on the target system), that the firewall not block the ports that are needed to support file<br />

and printer sharing, and also that “simple file sharing” be disabled.<br />

Some of the utilities require that the Remote Registry service be running on the target<br />

system. (The table at the end of the chapter lists which ones require this feature.) Note that in<br />

the newer versions of <strong>Windows</strong>, this service is not configured for automatic start by default.<br />

It therefore needs to be manually started or configured for automatic start before some of<br />

these tools will work.<br />

User Accounts<br />

Most of the utilities require administrative rights. Before <strong>Windows</strong> Vista and User Account<br />

Control, administrative accounts were straightforward. If the account was a member of the<br />

Administrators group, everything run by that account also ran with full administrative rights.<br />

Successfully authenticating to the computer with an account in the Administrators group<br />

allowed full control over the computer.<br />

<strong>Windows</strong> Vista introduced User Account Control, which (among other things) pioneered the<br />

concept of a user account that could be both an administrative account and a standard user<br />

account. This account type is sometimes called Protected Administrator. The idea is that programs<br />

started by the user will run with standard user privileges, and that for a program to<br />

run with full administrative rights, the user must explicitly approve the elevation. Programs<br />

running as the user should not be able to programmatically approve the elevation for the<br />

user or otherwise bypass the interaction. If they could, software developers would take those<br />

shortcuts and continue to write programs that required administrative rights rather than<br />

write software for standard users.<br />

Network loopback is one of the automatic elevation paths that <strong>Windows</strong> Vista blocks. As<br />

described in Knowledge Base article 951016, if a network connection is established to a<br />

remote computer using a local account that is a member of the Administrators group, it<br />

connects only with standard user privileges. Because it is not an interactive logon, there<br />

is no opportunity to elevate to full administrator. Domain accounts are not subject to this<br />

restriction.<br />

www.it-ebooks.info

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!