Windows 2000 Vulnerability Highlights
2001-07-18 00: 01: 10 · · Miao Rain ·· Yesky
1 2 3 4 5 Next Page
For Windows 2000's powerful features and new architectures, we have to sigh Microsoft's strength, which can foresee that Windows 2000 will become the mainstream of a new generation server operating system, and also become a hacker attack. However, due to the new Windows2000's new architecture relies on Active Directory (also known as AD), this makes a lot of administrators who are busy adapt to new operating systems, and the original data is migrated. The security issues for Windows 2000 have not attached enough attention. This article details the hackers often use some of the vulnerabilities and specific steps that are often used when attacking the Windows 2000 system, so that the network system administrator is trying to do as much as possible when maintaining the system. There is a word very reasonable: "There is no absolutely stupid system in the world, only absolutely stupid administrators." As long as our network administrators can carefully maintain the system, I believe that the hackers are not a machine. [Responsible Editor: Small Woodwork]
Login Input Method This is the first to introduce a login error, which is often the input method vulnerability. When we start the Windows 2000 to log in to the prompt interface, any user can open a help bar of various input methods, and you can use some of these functions to access the file system, which means we can bypass Windows2000 users. Log in to the verification mechanism and access the entire system with the highest administrator privilege. Therefore, this vulnerability is very harmful, and when we enter the system, you can use the Terminal Server remote communication. This vulnerability attacks the system. The default Windows2000 system comes with this vulnerability in the input method: intelligent ABC, Microsoft Pinyin, internal code, full fight, double fight, Zheng code. So I feel that this vulnerability is the leak of the primary repair. 1. Delete the unwanted input method, such as Zheng code, etc. 2, but after all, we cannot delete all the own input methods. If we want to use a vulnerability input method, you can delete the help file of that input method. These help files typically in the Win2000 installation directory (such as: c: / winnt) / Help directory, the corresponding help file is: ※ Winime.chm input method operation guide ※ Winsp.chm double spelling method help ※ Winzm. CHM Zheng code input method help ※ Winpy.chm full spelling method help ※ WINGB.CHM internal code input method help 3, Microsoft has released the MS00-069 security announcement for this issue, and gives Simplified Chinese Windows2000 and English version of Windows2000 patch. So please patch your patch as soon as possible.