viperbri68 Posted June 28, 2007 Share Posted June 28, 2007 After letting the MS critical updates download and install on our Small Business Server 2003 it asked to restart. I restarted the server now we can't login to the server console on our Administrator account. I even tried to remote desktop to the server and received the account / login does not exist or is the wrong password.Since the client workstations (all XP) could still login to the domain, print, browse the net, get email (Exchange), and access the file shares we could still work. I installed the Admin Pack on one of the XP workstations so I could look at the Active Directory Users and Computers. I connected to the server and could see all my users, except...my Administrator account was not there! Unfortunately I did not have a backup Administrator account (I know bad idea, but it was a small secured network).So my question is...how do I fix this? I can't re-create an Admin account even though I have access to the Active Directory because I don't have another user that has enough rights to do that.What are my options? Help! Thanks. Link to comment Share on other sites More sharing options...
cluberti Posted June 28, 2007 Share Posted June 28, 2007 Please tell me you have a recent system state backup on that server... Link to comment Share on other sites More sharing options...
viperbri68 Posted June 29, 2007 Author Share Posted June 29, 2007 Please tell me you have a recent system state backup on that server...Well, if I do I can't tell as BackupExec runs on the server and I can't login the server to check the backup (catch 22) Link to comment Share on other sites More sharing options...
cluberti Posted June 29, 2007 Share Posted June 29, 2007 You can try booting the server in AD Restore Safe Mode, and if you can login you can create an account. However, if you truly did delete the only admin account in the AD, and can't get in to restore a backup, you're pretty well hosed. Link to comment Share on other sites More sharing options...
Stoic Joker Posted June 29, 2007 Share Posted June 29, 2007 You can try booting the server in AD Restore Safe Mode, and if you can login you can create an account. However, if you truly did delete the only admin account in the AD, and can't get in to restore a backup, you're pretty well hosed.I know MS heavily restricted the system account a while back ... but I don't recall exactly when (and viper hasn't mentioned the SP level). (Anyhow...) There used to be an option (exploit) to run something under the system context by using the at command. Is it possible they could run a user account creation script (using the system account's rights with the at command) to create a user in (at least) the Server Operators group to try an get partial control of the box?It was a very effective privilege escalation hack back in the 2k days, I just don't recall when it was "fixed" (Eliminated). Link to comment Share on other sites More sharing options...
cluberti Posted June 29, 2007 Share Posted June 29, 2007 If you run W2K3SP1 or higher, the SYSTEM account on a DC no longer has any write access to the AD database, so it won't work. If it's RTM, however, it may be possible. Link to comment Share on other sites More sharing options...
nmX.Memnoch Posted June 29, 2007 Share Posted June 29, 2007 I didn't think it was possible to delete the BUILTIN\Administrator account...even if it was renamed? Link to comment Share on other sites More sharing options...
cluberti Posted June 29, 2007 Share Posted June 29, 2007 I didn't think it was possible to delete the BUILTIN\Administrator account...even if it was renamed?You can delete the admin account from AD - it's not a local account (DCs don't have local account SAMs). Link to comment Share on other sites More sharing options...
viperbri68 Posted June 30, 2007 Author Share Posted June 30, 2007 Thanks for the replies guys. I am nearly positive we had not installed SP1 yet. I thought you couldn't delete the administrator account either but I guess that makes sense it could get deleted from AD. I just don't understand how a windows update would delete it because it happened right after rebooting from the windows update installs.Any tips on the user elevation scripts? Link to comment Share on other sites More sharing options...
Stoic Joker Posted June 30, 2007 Share Posted June 30, 2007 (edited) Thanks for the replies guys. I am nearly positive we had not installed SP1 yet. I thought you couldn't delete the administrator account either but I guess that makes sense it could get deleted from AD. I just don't understand how a windows update would delete it because it happened right after rebooting from the windows update installs.Any tips on the user elevation scripts?Things needed:1. Any account that can initiate a console session on the server.2. A script that will create a user account and add it to User Group X (Might as well go for broke and try the Domain Admins group). But make sure you give it a complex enough password that it doesn't "trip" over the GP password complexity requirements.3. A rey of hope that SP1 was not installed A bit of background on what we're attempting:The AT command is an command line Task Scheduler, that by default runs under the System context and therefore has all the privliges of the System account.It's been a while since I used this so some googleing may be in order to get the syntax for the command right. but the object is to use the AT command to set the (user creation) script to run one minute in the future, wait that minute for the script to run, then log off and (hopefully) log back on with the newly created (administrative) user account.Yes I am being intentially sketchy with some of the details ... but I'm trying to give you enough information to get the job done, without completely outlining how to hack a box that some id10t script kiddie might try to missues. (not to mention that this has got to be right on the razor edge of the forum rules).Good Luck Man!Stoic Joker Edited June 30, 2007 by Stoic Joker Link to comment Share on other sites More sharing options...
Idontwantspam Posted June 30, 2007 Share Posted June 30, 2007 The well-known AT trick doesn't appear to work unless you have Administrator privileges. Logon as a regular or power user, and type at into the command prompt. You get Error: Access Denied. I don't know much about AD or Server 2k3, but if you can logon with an admin account, run this at command prompt (not the stuff I put in ~comments~)echo %time% ~This shows the current system timeat ~put in the current time + 1 minute or so here~ /interactive cmd.exeNow, wait for a minute and the new command window will open. It's running as NT_AUTHORITY\SYSTEM. You can figure out what to do from here - you have a command window running as system. I dunno, this is odd. Moderators, if this is too detailed and could be exploited, feel free to PM me or delete it. But most script kiddies can't use this to hack a box since this only works from an admin account. I hope this helps. Link to comment Share on other sites More sharing options...
cluberti Posted June 30, 2007 Share Posted June 30, 2007 I just don't understand how a windows update would delete it because it happened right after rebooting from the windows update installs.The likelihood that a Windows Update was able to delete something in AD is pretty much nil, but the other part of your statement is where I would start poking around at - the reboot. It's much more likely that something else was done while the box was up that required a reboot (malicious or otherwise), and the reboot after the Windows Updates caused the problem.As to the problem, I do remember having to do this once, and I remember it working on a 2003 RTM machine (it wasn't SBS, however, so I can't speak to that). The AT trick didn't work, but setting the default screensaver in the registry to cmd.exe instead of logon.scr seems to sound very familiar. Link to comment Share on other sites More sharing options...
Stoic Joker Posted July 1, 2007 Share Posted July 1, 2007 The AT trick didn't work, but setting the default screensaver in the registry to cmd.exe instead of logon.scr seems to sound very familiar.No dice on that one either (I just tried), permission denied writing to .Default user key. How ever I think you are on to something (memory = jogged) If he uses a WindowsPE disk (adding RAID drivers if/as needed) he can gain write access to the file system on C:.Then rename logon.scr to logon.bak (so it can be put back later), then copy cmd.exe to logon.scr.Reboot back to the harddrive but don't login.Wait 15min (Default SS timeout) and he's got a running with system rights comand prompt, that thinks it's a screensaver. Link to comment Share on other sites More sharing options...
Stoic Joker Posted July 1, 2007 Share Posted July 1, 2007 Crap ... Make that none of the above. I've been trying to hack a copy of Win2000 for an hour with no joy.I sent viper a PM with a link to a (Um...) "Security" site that had instructions on a known working method of accessing the necessary creds via DSR mode.I guess we suck at hacking... *Sigh* (lol) Link to comment Share on other sites More sharing options...
viperbri68 Posted July 3, 2007 Author Share Posted July 3, 2007 sj-Thanks for trying it out and thanks for the PM. I will let you know once I go onsite to the customer to see how it works out. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now