Skip to main content

Windows Security

Security Architecture of Windows

 There are three components of Windows Security:
 LSA (Local Security Authority)
 SAM (Security Account Manager)
 SRM (Security Reference Monitor)


LSA (Local Security Authority)

 LSA is the Central Part of NT Security. It is also known as Security Subsystem. The Local Security Authority or LSA is
a key component of the logon process in both Windows NT and Windows 2000. In Windows 2000, the LSA is
responsible for validating users for both local and remote logons. The LSA also maintains the local security policy.

 During the local logon to a machine, a person enters his name and password to the logon dialog. This information
is passed to the LSA, which then calls the appropriate authentication package. The password is sent in a nonreversible
secret key format using a one-way hash function. The LSA then queries the SAM database for the User’s
account information. If the key provided matches the one in the SAM, the SAM returns the users SID and the SIDs
of any groups the user belongs to. The LSA then uses these SIDs to generate the security access token.

SAM (Security Account Manager)

 The Security Accounts Manager is a database in the Windows operating system (OS) that contains user names and
passwords. SAM is part of the registry and can be found on the hard disk.

 This service is responsible for making the connection to the SAM database (Contains available user-accounts and
groups). The SAM database can either be placed in the local registry or in the Active Directory (If available). When
the service has made the connection it announces to the system that the SAM-database is available, so other
services can start accessing the SAM-database.

 In the SAM, each user account can be assigned a Windows password which is in encrypted form. If someone
attempts to log on to the system and the user name and associated passwords match an entry in the SAM, a
sequence of events takes place ultimately allowing that person access to the system. If the user name or
passwords do not properly match any entry in the SAM, an error message is returned requesting that the
information be entered again.

 When you make a New User Account with a Password, it gets stored in the SAM File.

 Windows Security Files are located at

             “C:\Windows\System32\Config\SAM”

 The moment operating system starts, the SAM file becomes inaccessible.

SRM (Security Reference Monitor)

 The Security Reference Monitor is a security architecture component that is used to control user requests to
access objects in the system. The SRM enforces the access validation and audit generation. Windows NT forbids
the direct access to objects. Any access to an object must first be validated by the SRM. For example, if a user
wants to access a specific file the SRM will be used to validate the request. The Security Reference Monitor
enforces access validation and audit generation policy.

 The reference monitor verifies the nature of the request against a table of allowable access types for each process
on the system. For example, Windows 3.x and 9x operating systems were not built with a reference monitor,
whereas the Windows NT line, which also includes Windows 2000 and Windows XP, was designed with an entirely
different architecture and does contain a reference monitor.

Windows user account architecture

 User account passwords are contained in the SAM in the Hexadecimal Format called Hashes.

 Once the Passwords converted in Hashes, you cannot convert back to the Clear Text.



Comments

Popular posts from this blog

How To Hide Files Behind JPEG Image

Hiding files by some sort of software has been a very common way till now, but if you are looking for something different you can do it by hiding a file behind a jpg image. It is a quite secured way to hide a file behind JPEG image because none will think about the existence of a file inside a jpg image. It is also free from the hazards of installing those software and consequently nobody will notice there is a secret file hidden behind a jpg picture file.
But here I am going to introduce another interesting way. You can use this simple trick to hide any kind of file like txt, mp3, exe, avi or whatever else. Besides this you can hide multiple number of files behind a single jpg file. When any one will see the picture he/she will just consider it as a picture and even if he/she double click on it then the picture will be opened as normal. Isn’t it sounds interesting? To execute this task you must need WinZip or WinRar to be installed in your PC. You can download it absolutely free from …

How to Create a Password Protected Folder without any Extra Software

There are a lot of methods that you can use to create a password protected folder, most of which require the use of some third party software. Using this neat method you can hide your folders with a quick batch script. It’s important to note that this will not actually conceal your data from somebody that knows what they are doing. Note: if you are a beginner you should be careful with this script Create Your Password Protected Folder
Before you get started you need to create a folder that will house your password protected folder, this is just an ordinary folder and can be located anywhere and named anything. Navigate into your newly created folder and create a new Text Document. This can easily be done from the context menu.
Open the document, now paste the following code into the contents of the document:
cls @ECHO OFF title Folder Private if EXIST "HTG Locker" goto UNLOCK if NOT EXIST Private goto MDLOCKER :CONFIRM echo Are you sure you want to lock the folder(Y/N) set/…

Create Text Speech Program using Notepad

This is an amazing trick. By using this trick you can make a program to speak whatever you type. This trick is working on all Microsoft operating system and does not require any programming skills. You have to follow just simple steps and your own Text to Speech software will be ready. If you show this software to any of your friends he will be certainly impressed with you . Just follow the step given bellow:-
1. Open Notepad and copy and paste the following code into it

Dim message, sapimessage=InputBox("What do you want me to say?","Speak to Me")Set sapi=CreateObject("sapi.spvoice")sapi.Speak message

2.Now save the notepad file with the name speak.vbs at your desktop.
3.Now double click on speak.vbs type in the box whatever you want your computer to speak for you.
Its a really funny trick to impress everybody with your computer skills.....