Windows Server 2008 R2 Tutorial

  1. Windows Server 2008 R2 Video Tutorial
  2. Windows Server 2008 R2 Tutorial Videos
  3. Windows Server 2008 R2 Tutorial Ppt

In this article we will be looking at how easy it is to bypass authentication and reset the administrator password on a Windows Server 2008 R2 installation. This technique requires us to have physical access to the machine that is running the Windows server or have access to the management interface of the hypervisor when Windows Server 2008 R2 is running virtualized. This is not a great ‘hacking’ technique that can be used to pwn all Windows installations but it is more a sysadmins last resort trick when nothing else works on a forgotten password. And in some other situations it is definitely useful and comes in handy when you need it. Especially at the point when you’ve compromised the administration panel of the hypervisor software. This kind of access allows you to control the virtual machines as if you had physical access to it, including the ability to use boot disk and modify system files. Alternatively you can apply this technique when have some kind of physical access to a host.

Insert the Windows 2008 R2 DVD into your DVD drive and let the computer boot from DVD. The Windows installer will begin. Select your Language, Time and Currency and Keyboard or input method and click Next. Click Install now. Select the version of Windows 2008 R2 that you wish to install and click Next. Accept the license terms and click Next. This is a fresh install, therefore the Upgrade option does not apply to us. This Tutorial will guide you through how to install Microsoft Windows 2008 R2 Server. Please note that Windows 2008 R2 is only available in 64-bit. How to setup a Windows Domain Controller running Windows Server 2008 R2. How to setup Active Directory Domain Services and DNS. First video in a series that will take you step-by-step through the.

A couple months ago I was conducting a penetration test on a staged Windows environment that was running on a VMware hypervisor. The environment contained a domain controller and 3 application servers that were running Windows Server 2008 R2. Other then the Windows machines I also encountered a few Linux based network and back-up devices. As it was not very hard to compromise the machines on this network I was able to access the VMware vSphere administration panel as administrator in a very early stage of the penetration test. This access level allowed me to reset the administrator password using a boot CD and finally login to the Windows Server with administrator privileges. In the follow sections I will explain how I did this and how you can secure your Windows installations from applying this technique.

Resetting the administrator password on Windows Server 2008 R2

  • Windows Server Training and Tutorials. Learn how to set up and manage Windows Server. These courses cover everything from Active Directory to networking and file storage. Start watching these tutorials to solve your Windows Server issues today. Start My Free Month. Same content. Same instructors.
  • Windows Server 2008 was officially released on February 27, 2008. Many of the features included in Windows Server 2008 are Server Core, AD roles, Failover clustering, Self-healing NTFS, Hyper-V, Server manager, DNS, DHCP, etc. I this section you will find tutorials related to Windows Server 2008.
  • Installing Windows 2008 R2. How to setup a Windows 2008 R2 Domain Controller. How to install and configure Network Policy Server NPS. Windows 2008 R2 Powershell 2.0 Pocket Guide Reference. How to set the Optimal MTU in Windows 2008 R2. The Best way to.

The starting point of this tutorial is a machine with Windows Server 2008 R2 Enterprise that has been booted with a boot CD. In this example we’ve used the Hiren boot CD (HBCD) but you can use any alternative boot CD as well, including a Windows installation disk. After booting the system from the boot CD navigate to the following directory of the drive that contains the Windows Server 2008 R2 installation:

/Windows/System32

In this directory you will find an executable file named ‘Utilman.exe’. Utilman is a small utility that is used to configure accessibility options such as the magnifier and the on-screen keyboard. What’s so special about Utilman.exe is that we are able to execute this program before logging in the system. We can do this by clicking the small ‘accessibility’ button in the bottom left corner of the Windows logon menu:

Windows Server 2008 R2 Video Tutorial

The ‘accessibility’ button to launch Utilman.exe displayed at the left.

Now that we have access to the /Windows/System32 directory we can swap out the Utilman.exe program with the cmd.exe program. When we swap out these applications we can start cmd.exe with system privileges instead of Utilman.exe when pressing the accessibility button in the logon screen. From this point we are able to reset the administrator password and use it to login.

Windows Server 2008 R2 Tutorial Videos

First we will rename the Utilman.exe program to Utilman.exe.old as following:

Tutorial

The next step is to rename cmd.exe to Utilman.exe as following:

Rename cmd.exe to Utilman.exe. You can also copy cmd.exe and rename it so you can still use cmd.exe after logging in to Windows.

Now that we’ve swapped Utilman.exe with cmd.exe we only have to reboot the machine into Windows and click the accessibility button on the login screen. As expected this will launch a command line instead of the accessibility options:

Windows Server 2008 R2 Tutorial Ppt

The next step is to change the administrator password as following:

Server

Change the administrator password.

Finally we can logon Windows with the new administrator credentials:

Tutorial

Windows Server 2008 R2 Enterprise signing in with the new administrator credentials.

Lessons learned

In this article we’ve seen how easy it is to get administrator access to a Windows Server 2008 R2 Enterprise host after we’ve compromised the hypervisor. Just the fact that we were able to boot the machine with a boot CD allowing us to tamper with data on the hard drive is a serious security issue with serious consequences. There are several ways to prevent and mitigate these kind of attacks. One of them is to secure the BIOS with a password so that an attacker cannot change the boot options for the machine, thus unable to boot from the boot CD. A more effective way would be to apply full disk encryption which encrypts all the data on the disk preventing the attacker from tampering with it.

I hope you’ve found this small tutorial useful in some way. If you’re looking to try this technique or to practice penetration testing techniques on Windows Server 2008 machines, I can recommend you to install Metasploitable 3 which is based on Windows Server 2008.