Philippatos wrote: Yeah that MS article is just plain wrong. In NT 4.0 you *COULD* delete IPC$ directly, but not in XP. I used to use that trick AFTER loging into the domain to prevent domain admins from being able to administer my workstation. If they tried to connect they'd get an "access denied" message. I could still access all network resources though, so didn't hinder my work at all. In the context of C|EH though IPC$ is for establishing null sessions used by hackers for enumeration.http://www.windowsecurity.com/whitepaper/Windows-Enumeration-USER2SID-SID2USER.html PS: It's also the reason why renaming the administrator account is a useless "best practice". Should just call it a "useless practice", but someone decided it's best, so must be.
Philippatos wrote: You're entitled to your opinion. Saying something is "best" doesn't make it so,)
Philippatos wrote: however, regardless of whatever authority you think you carry on the topic.
Philippatos wrote: The fact remains changing the administrator account name secures nothing, unlike a lock. You can also change the root account name in *NIX. Nobody does it for the same reason, root's ID would still be the same (in this case zero not 500).
Philippatos wrote: Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.http://en.wikipedia.org/wiki/Strong_password And for maximum security use a random password generator, like:http://www.liebsoft.com/index.cfm/products/rpmee
keatron wrote: Philippatos wrote: Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.http://en.wikipedia.org/wiki/Strong_password And for maximum security use a random password generator, like:http://www.liebsoft.com/index.cfm/products/rpmee For maximum security you'd use three factor authentication, not single factor (password).
sprkymrk wrote: keatron wrote: Philippatos wrote: Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.http://en.wikipedia.org/wiki/Strong_password And for maximum security use a random password generator, like:http://www.liebsoft.com/index.cfm/products/rpmee For maximum security you'd use three factor authentication, not single factor (password). Agreed keatron. In addition, in many environments there is no "real" need for a local admin account anyway. Disable it. Set a strong, random password. Require a Smart Card to log into the workstation. Set the "deny log on locally" for the local admin account. Phil - you, of all people should know, creating a strong password is NOT "all there is to it". I am sure your C|EH training taught about linux boot disks...