Labels

Saturday, March 22, 2008

Troubleshooting computer accounts in an Active Directory domain

Included are a few esoteric commands and example output of validating Windows Server 2003 computer account objects in an Active Directory domain. The information returned can help troubleshoot Kerberos, the secure channel with the domain, Service Principal Names registered against the computer account, and various bits of local computer information such as group membership and local rights.

Note that this was all run under the system context, the easiest way I know of to get this information, which for network requests translates to networkservice and the AD computer account object.

This was completed by connecting to the console (mstsc /v:%host% /console), and then running:

  • psexec /s /i /d cmd.exe

Note that the console connection is important, as the interactive psexec process is attached to the interactive winlogon console session.

Utilities required:

  • psexec
  • klist
  • setspn
  • nltest
  • whoami

Example output:



C:\>klist tgt

Cached TGT:

ServiceName: krbtgt
TargetName: krbtgt
FullServiceName: COMPUTER$
DomainName: FQDN.DOMAIN
TargetDomainName: FQDN.DOMAIN
AltTargetDomainName: FQDN.DOMAIN
TicketFlags: 0x40e00000
KeyExpirationTime: 1/1/1601 10:00:00
StartTime: 1/16/2008 11:09:20
EndTime: 1/16/2008 21:09:20
RenewUntil: 1/23/2008 11:09:20
TimeSkew: 1/1/1601 10:00:00

C:\>klist tickets

Cached Tickets: (8)

Server: krbtgt/FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: krbtgt/FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: cifs/DC.FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: ldap/DC.FQDN.DOMAIN/FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: host/COMPUTER.FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: COMPUTER$@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: LDAP/DC.FQDN.DOMAIN/FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


Server: cifs/DC.FQDN.DOMAIN@FQDN.DOMAIN
KerbTicket Encryption Type: RSADSI RC4-HMAC(NT)
End Time: 1/16/2008 21:09:20
Renew Time: 1/23/2008 11:09:20


C:\>setspn -L COMPUTER
Registered ServicePrincipalNames for CN=COMPUTER,OU=Test,DC=domain,DC=com:
HOST/COMPUTER
HOST/COMPUTER.FQDN.DOMAIN

C:\>nltest /sc_query:corp
Flags: 30 HAS_IP HAS_TIMESERV
Trusted DC Name \\DC.FQDN.DOMAIN
Trusted DC Connection Status Status = 0 0x0 NERR_Success
The command completed successfully

C:\>nltest /sc_verify:corp
Flags: b0 HAS_IP HAS_TIMESERV
Trusted DC Name \\DC.FQDN.DOMAIN
Trusted DC Connection Status Status = 0 0x0 NERR_Success
Trust Verification Status = 0 0x0 NERR_Success
The command completed successfully

C:\>whoami /all 

USER INFORMATION 
---------------- 

User Name SID 
=================== ======== 
nt authority\system S-1-5-18 


GROUP INFORMATION 
----------------- 

Group Name Type SID Attributes 
================================ ================ ============ ================================================== 
BUILTIN\Administrators Alias S-1-5-32-544 Enabled by default, Enabled group, Group owner 
Everyone Well-known group S-1-1-0 Mandatory group, Enabled by default, Enabled group 
NT AUTHORITY\Authenticated Users Well-known group S-1-5-11 Mandatory group, Enabled by default, Enabled group 


PRIVILEGES INFORMATION 
---------------------- 

Privilege Name Description State 
=============================== ========================================= ======== 
SeTcbPrivilege Act as part of the operating system Enabled 
SeCreateGlobalPrivilege Create global objects Enabled 
SeTakeOwnershipPrivilege Take ownership of files or other objects Disabled 
SeCreatePagefilePrivilege Create a pagefile Enabled 
SeLockMemoryPrivilege Lock pages in memory Enabled 
SeAssignPrimaryTokenPrivilege Replace a process level token Disabled 
SeIncreaseQuotaPrivilege Adjust memory quotas for a process Disabled 
SeIncreaseBasePriorityPrivilege Increase scheduling priority Enabled 
SeCreatePermanentPrivilege Create permanent shared objects Enabled 
SeDebugPrivilege Debug programs Enabled 
SeAuditPrivilege Generate security audits Enabled 
SeSecurityPrivilege Manage auditing and security log Disabled 
SeSystemEnvironmentPrivilege Modify firmware environment values Disabled 
SeChangeNotifyPrivilege Bypass traverse checking Enabled 
SeBackupPrivilege Back up files and directories Disabled 
SeRestorePrivilege Restore files and directories Disabled 
SeShutdownPrivilege Shut down the system Disabled 
SeLoadDriverPrivilege Load and unload device drivers Disabled 
SeProfileSingleProcessPrivilege Profile single process Enabled 
SeSystemtimePrivilege Change the system time Disabled 
SeUndockPrivilege Remove computer from docking station Disabled 
SeManageVolumePrivilege Perform volume maintenance tasks Enabled 
SeImpersonatePrivilege Impersonate a client after authentication Enabled 



Wayne's World of IT (WWoIT), Copyright 2008 Wayne Martin.

1 comment:

sager said...

Congratulation for the great post. Those who come to read your article will find lots of helpful and informative tips.

HP - Pavilion 15.6" Refurbished Laptop - 4GB Memory - 750GB Hard Drive


All Posts

printQueue AD objects for 2003 ClusterVirtualCenter Physical to VirtualVirtual 2003 MSCS Cluster in ESX VI3
Finding duplicate DNS recordsCommand-line automation – Echo and macrosCommand-line automation – set
Command-line automation - errorlevels and ifCommand-line automation - find and findstrBuilding blocks of command-line automation - FOR
Useful PowerShell command-line operationsMSCS 2003 Cluster Virtual Server ComponentsServer-side process for simple file access
OpsMgr 2007 performance script - VMware datastores...Enumerating URLs in Internet ExplorerNTLM Trusts between 2003 and NT4
2003 Servers with Hibernation enabledReading Shortcuts with PowerShell and VBSModifying DLL Resources
Automatically mapping printersSimple string encryption with PowerShellUseful NTFS and security command-line operations
Useful Windows Printer command-line operationsUseful Windows MSCS Cluster command-line operation...Useful VMware ESX and VC command-line operations
Useful general command-line operationsUseful DNS, DHCP and WINS command-line operationsUseful Active Directory command-line operations
Useful command-linesCreating secedit templates with PowerShellFixing Permissions with NTFS intra-volume moves
Converting filetime with vbs and PowerShellDifference between bat and cmdReplica Domain for Authentication
Troubleshooting Windows PrintingRenaming a user account in ADOpsMgr 2007 Reports - Sorting, Filtering, Charting...
WMIC XSL CSV output formattingEnumerating File Server ResourcesWMIC Custom Alias and Format
AD site discoveryPassing Parameters between OpsMgr and SSRSAnalyzing Windows Kernel Dumps
Process list with command-line argumentsOpsMgr 2007 Customized Reporting - SQL QueriesPreventing accidental NTFS data moves
FSRM and NTFS Quotas in 2003 R2PowerShell Deleting NTFS Alternate Data StreamsNTFS links - reparse, symbolic, hard, junction
IE Warnings when files are executedPowerShell Low-level keyboard hookCross-forest authentication and GP processing
Deleting Invalid SMS 2003 Distribution PointsCross-forest authentication and site synchronizati...Determining AD attribute replication
AD Security vs Distribution GroupsTroubleshooting cross-forest trust secure channels...RIS cross-domain access
Large SMS Web Reports return Error 500Troubleshooting SMS 2003 MP and SLPRemotely determine physical memory
VMware SDK with PowershellSpinning Excel Pie ChartPoke-Info PowerShell script
Reading web content with PowerShellAutomated Cluster File Security and PurgingManaging printers at the command-line
File System Filters and minifiltersOpsMgr 2007 SSRS Reports using SQL 2005 XMLAccess Based Enumeration in 2003 and MSCS
Find VM snapshots in ESX/VCComparing MSCS/VMware/DFS File & PrintModifying Exchange mailbox permissions
Nested 'for /f' catch-allPowerShell FindFirstFileW bypassing MAX_PATHRunning PowerSell Scripts from ASP.Net
Binary <-> Hex String files with PowershellOpsMgr 2007 Current Performance InstancesImpersonating a user without passwords
Running a process in the secure winlogon desktopShadow an XP Terminal Services sessionFind where a user is logged on from
Active Directory _msdcs DNS zonesUnlocking XP/2003 without passwords2003 Cluster-enabled scheduled tasks
Purging aged files from the filesystemFinding customised ADM templates in ADDomain local security groups for cross-forest secu...
Account Management eventlog auditingVMware cluster/Virtual Center StatisticsRunning scheduled tasks as a non-administrator
Audit Windows 2003 print server usageActive Directory DiagnosticsViewing NTFS information with nfi and diskedit
Performance Tuning for 2003 File ServersChecking ESX/VC VMs for snapshotsShowing non-persistent devices in device manager
Implementing an MSCS 2003 server clusterFinding users on a subnetWMI filter for subnet filtered Group Policy
Testing DNS records for scavengingRefreshing Computer Account AD Group MembershipTesting Network Ports from Windows
Using Recovery Console with RISPAE Boot.ini Switch for DEP or 4GB+ memoryUsing 32-bit COM objects on x64 platforms
Active Directory Organizational Unit (OU) DesignTroubleshooting computer accounts in an Active Dir...260+ character MAX_PATH limitations in filenames
Create or modify a security template for NTFS perm...Find where a user is connecting from through WMISDDL syntax in secedit security templates

About Me

I’ve worked in IT for over 13 years, and I know just about enough to realise that I don’t know very much.