I love clients like that. For all their stupidity, they keep us in work :-)


On 11 September 2013 15:42, Webster <[email protected]> wrote:

>  Sorry this page:****
>
> ** **
>
> http://technet.microsoft.com/en-us/library/cc738772(v=ws.10).aspx****
>
> ** **
>
> *[image: note]**Note *
>
> Microsoft does not recommend that you use this tool on servers that host
> network programs or services. You should not enable ALockout.dll on
> Exchange servers because the ALockout.dll tool may prevent the Exchange
> store from starting.****
>
> *[image: Important]**Important *
>
> Before you install the ALockout.dll tool on any mission-critical computer,
> make a full backup copy of the operating system and any valuable data.****
>
> ** **
>
> Since two of their DCs also host mission critical stuff (like 20
> production SQL databases) and they have never, ever tested their backups,
> the request to install was denied.****
>
> ** **
>
> Thanks****
>
> ** **
>
> ** **
>
> Webster****
>
> ** **
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Kennedy, Jim
> *Sent:* Wednesday, September 11, 2013 9:34 AM
>
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
>  ** **
>
> I am missing the warnings, don’t see them on the page at all. I use it
> often, it really helps.****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Webster
> *Sent:* Wednesday, September 11, 2013 10:31 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> I looked at that also but all the dire warnings on the page made the CIO
> reject our request to install it.****
>
> ** **
>
> Thanks****
>
> ** **
>
> ** **
>
> Webster****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Tim Evans
> *Sent:* Wednesday, September 11, 2013 9:16 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> I've found the Account Lockout and Management Tools at
> http://www.microsoft.com/en-us/download/details.aspx?id=18465  very
> helpful in tracking down lockout problems. Just yesterday, we found an
> issue where Lync cached a bad password and would lockout a user immediately
> after they made a VPN connection.****
>
> ** **
>
> …Tim****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Wednesday, September 11, 2013 4:19 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> I am thinking that is going to be my case. I am logging in as a different
> account on the same pc now to see if I get the failed logon requests.****
>
> Email account is deleted from iphone for now.  Still not seeing it but I
> will continue on this path because I am loathe to build a new pc right this
> minute.  In the middle of a 16 man regulator team audit and get my
> Virtualization equipment delivered this week.  Kind of not in the mood for
> this failed logon crap…I am really hoping it is not one of the other admins
> messing with me…thanks for all your pointers up til now.  I am using them
> all to check things off that it isn’t.   ****
>
> ** **
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David L Herrick
> *Sent:* Tuesday, September 10, 2013 4:11 PM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
> ** **
>
> I am loathe to admit it. However, I have seen similar when having setup a
> test (scheduled task, or such) using my cred’s and “forgot” to go back and
> change it until my password change initiated errors****
>
>  ****
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Adm
> *Sent:* Tuesday, September 10, 2013 12:58 PM
> *To:* [email protected]
> *Subject:* Re: [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> Most of our login problems here are caused by Android device not getting
> password updated.****
>
>  ****
>
> On Tue, Sep 10, 2013 at 3:42 PM, David McSpadden <[email protected]> wrote:*
> ***
>
> Not rootkit, no conficker, but 3 logon hits on the dc’s from the dc’s
> using my creds while I was offline scanning???****
>
>  ****
>
>  ****
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Kelsey, John
> *Sent:* Tuesday, September 10, 2013 11:45 AM****
>
>
> *To:* '[email protected]'
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> Had a similar issue here, I think it was a conficker variant causing the
> problem.  The event gave the address of the offending PC though so it was
> easier to track down.****
>
>  ****
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Webster
> *Sent:* Tuesday, September 10, 2013 11:31 AM****
>
>
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> After 3 days of looking, we gave up for now.  But this will need to be
> resolved before they do their AD migration into the parent company.****
>
>  ****
>
> Thanks****
>
>  ****
>
>  ****
>
> Webster****
>
>  ****
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Tuesday, September 10, 2013 10:23 AM****
>
>
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> Have you found the bad process yet?****
>
> I am watching my event viewer on the DC’s right now waiting for the hit so
> I can then go into my Procmon and Netmon processes to find it on my machine.
> ****
>
>  ****
>
>  ****
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Webster
> *Sent:* Tuesday, September 10, 2013 11:09 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> The built-in administrator account.  Tens of thousands of 0x12 and 0x18
> every day.****
>
>  ****
>
> I saved and cleared all the event logs at 7PM on Wednesday and when we
> showed up at 8AM Thursday there were already over 358,000 failed logon
> attempts!****
>
>  ****
>
> Thanks****
>
>  ****
>
>  ****
>
> Webster****
>
>  ****
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Tuesday, September 10, 2013 10:02 AM
> *To:* [email protected]
> *Subject:* RE: [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> Just Domain admins?****
>
>  ****
>
>  ****
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Webster
> *Sent:* Tuesday, September 10, 2013 10:54 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: Logon sniffing tool****
>
>  ****
>
> I faced the same issue last week.  We were unable to determine the cause
> of the mysterious attempts to lockout the domain admin administrator
> account.  There were no services or scheduled tasks that used that account
> and even using “rundll32 keymgr.dll,KRShowKeyMgr” showed no cached
> credentials on any of the computers.****
>
>  ****
>
> The DC’s security event logs are being flooded with 0x12 and 0x18 errors
> for eventids 675 and 680.****
>
>  ****
>
> I am interested in also seeing what the lists suggests for tracking this
> down.****
>
>  ****
>
> Thanks****
>
>  ****
>
>  ****
>
> Webster****
>
>  ****
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Tuesday, September 10, 2013 9:25 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] Logon sniffing tool****
>
>  ****
>
> My machine is trying and failing to log into the domain about every 6
> minutes.****
>
> What tool can I use to find the process, service, or program that is
> attempting to log in with a bad password?****
>
> Windows 8 64 bit failing with a 2008 AD.****
>
> Event id 675 code 0x18****
>
>  ****
>
>  ****
>
> *Thank you*****
>
> * *****
>
> *David W. McSpadden*****
>
> * *****
>
> *B*egin Planning****
>
> *A*rrange for Reconnaissance and Coordination****
>
> *M*ake Reconnaissance****
>
> *C*omplete Plan****
>
> *I*ssue Order****
>
> *S*upervise****
>
>  ****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
>  ****
>
> Please consider the environment before printing this email.****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
>  ****
>
> Please consider the environment before printing this email.****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
>  ****
>
> Please consider the environment before printing this email.****
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should
> not read, distribute, copy or alter this email. Any views or opinions
> expressed in this email are those of the author and do not represent those
> of the company. Warning: Although precautions have been taken to make sure
> no viruses are present in this email, the company cannot accept
> responsibility for any loss or damage that arise from the use of this email
> or attachments.****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
>  ****
>
> Please consider the environment before printing this email.****
>
>
>
>
> --
> smsadm ****
>
> This email and any files transmitted with it are confidential and intended
> solely for the use of the individual or entity to whom they are addressed.
> If you have received this email in error please notify the system manager.
> This message contains confidential information and is intended only for the
> individual named. If you are not the named addressee you should not
> disseminate, distribute or copy this e-mail. Please notify the sender
> immediately by e-mail if you have received this e-mail by mistake and
> delete this e-mail from your system. If you are not the intended recipient
> you are notified that disclosing, copying, distributing or taking any
> action in reliance on the contents of this information is strictly
> prohibited. ****
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.****
>
> ** **
>
> Please consider the environment before printing this email.****
>



-- 
*James Rankin*
Technical Consultant (ACA, CCA, MCTS)
http://appsensebigot.blogspot.co.uk

<<image001.gif>>

Reply via email to