论文部分内容阅读
Internet上采用 Windows NT平台作为服务器的站点越来越多,同时,众多企业已经开始采用 NT平台作为 企业计算和内部 Intranet的解决方案。但是 Windows NT所采用的存储数据库和加密过程导致了一系列的安全漏洞。 NT把用户信息和加密口令保存于 NT Registry中的 SAM文件中,即安全帐户管理( SecurityAccounts Management)数据库。加密口令分两个步骤完成。首先,采用 RSA MD4系统对口令进行加密;第二步则是令人迷惑的缺乏复杂度的过程,不添加任何“佐料”,比如加密口令时考虑时间的因素等。结果是NT 口令比UNIX 口令更加脆弱:更容易受到一本简单字典的攻击。这里描述的某些安全漏洞是很严重的。在最坏的情况下,一个黑客可以利用这些漏洞来玻译一个或多个 Domain Administrator帐户的口令,并且对NT域中的所有主机进行破坏活动。
More and more sites using the Windows NT platform as a server on the Internet, meanwhile, many enterprises have begun to adopt the NT platform as a solution for enterprise computing and internal intranet. However, the storage database and encryption used by Windows NT lead to a series of security holes. NT stores user information and encrypted passwords in SAM files in the NT Registry, the Security Accounts Management database. Encryption password is completed in two steps. The first step is to encrypt the password using the RSA MD4 system. The second step is to confuse the labyrinth of complexity without adding any “spice”, such as considering time when encrypting passwords. The result is that NT passwords are more vulnerable than UNIX passwords: more vulnerable to a simple dictionary attack. Some of the security vulnerabilities described here are serious. In the worst case, a hacker could exploit these vulnerabilities to translate passwords for one or more Domain Administrator accounts and sabotage all hosts in the NT domain.