Skip to main content

Checking access to folder in a domain environment [Quick Tip]

Let's say you have limited access at a work place and manager wants if a user has access for something that they requested and you don't have the proper access to check. Today I will show you how to check access on limited access. The way that this example is setup is by virtual environment from Windows 2003 Server to Windows XP.

Tools
  • Virtualbox (free edition) running in local environment
  • rdesktop (free)
  • vmware (trial)
  • Windows Server 2003 Enterprise Edition (Student Version 180 days trial) running in a remote location



The picture above is typical Windows Server login. It just shows that I am running server OS. Ok let's move on.

















We are going to check on a user on "DTSAdmin" At the command prompt type "net user DTSAdmin /domain" it will gather from the server a lot of good information as shown in the picture above. If you don't type the "/domain" syntax the computer is going to think that user name is at the local machine. You will get an error like this in the screen-shot below.















Remember the command prompt is powerful tool if you know how use it properly.

Thanks for reading.

Comments

Popular posts from this blog

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more

Protecting the Kernel

Standard Linux Kernel When installing Linux it comes with the default Linux kernel compiled which is okay for most user, but when it comes to protect your data it is also good idea to build your own secure configuration. To get latest state or beta version of the kernel go to http://www.kernel.org/ Note: if you’re still unsure or feel uneasy if you want to do this then this is not for you. To get full details on compiling Linux Kernel you can visit: http://www.digitalhermit.com/linux/Kernel-Build-HOWTO.html#CONFIGURATION-INTRO http://www.faqs.org/docs/Linux-HOWTO/Kernel-HOWTO.html For security reason the DTS server kernel configuration can not be shown.

New PDF Tutorials

I made some new tutorial enjoy! The Linux Permission PDF is how you can control your user see what files or folders. File Name: Linux Permissions.pdf File Size: 847KB Date Created: 03/25/2010 Download Now The Recover Your Data PDF is how you can recover your files in cases your windows operating system isn't booting up or your windows OS has spyware or virus.. This is the first half of recoverying your data. The second part will show you how to recover a deleted file, but that would be explain in the next PDF File Name: Recover Your Data.pdf File Size: 1540KB Date Created: 03/25/2010 Download Now   Hosted by Microsoft Office Live