< Day Day Up > |
Having automatic logon enabled on a computer can be a security risk. Here's a quick way to find out which machines on your network have automatic logon enabled . While enabling automatic logon [Hack #4] in Chapter 1 can be useful in certain scenarios, such as a test network, it can also be a security risk, especially if it is enabled on a computer without the administrator's knowledge. Here is a quick and dirty way to locate all machines that have automatic logon enabled in their Registry. You'll need the following tools:
Create a batch file that will use the provided list and kick off regfind . For this we will use the FOR DOS command (all on one linetext is wrapped here to fit the constraints of the page): for /F %%A in (serverlist.txt) do (regfind.exe -m \%%A -p "hkey_local_machine\software\ microsoft\windows nt\currentversion\winlogon" -n "Autoadminlogon" >results.txt) You can see that we are simply parsing the serverlist.txt file for each server name , then instructing regfind to locate that Registry key. There are two caveats, though. First, the results can be hard to read while the search is going on. It is recommended that you pipe the results to a text file (the preceding example does this). Second, regfind is case-sensitive. This can make the search a bit longer, but it's still fairly easy. Instead of just a one-line batch file, you simply have a few more (almost identical) lines. A larger sample of the completed batch file looks something like this (again, all on one linebeware of line wrap): for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "Autoadminlogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "AutoadminLogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "AutoAdminlogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "AutoAdminLogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "autoAdminlogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "autoadminlogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "autoAdminLogon" >results.txt) for /F %%A in (serverlist.txt) do (c:\work\adminlogon\regfind.exe -m \%%A -p "hkey_local_machine\software\microsoft\windows nt\currentversion\winlogon" -n "autoadminLogon" >results.txt) Using this method, you can scan a select list of workstations/servers for this key fairly quickly. Hacking the HackThis procedure can easily be modified to find out other Registry keys as well, simply by changing the key name to search for. Enjoy! Donnie Taylor |
< Day Day Up > |