Quote:
<font face="Verdana, Arial" size="2">Originally posted by Raynar:
Ok, I'm on the other side of the fence in this situation. I'm one of the network admins at a private school here in Oz.
Using Windows 2000 security policies, we've got the student workstations tighter than a deep sea fish's bumhole. The local drives are read-only apart from a single directory. User's desktops are stored in their user directory on the network. The kids can screw up their own directory and nothing else.
In the very rare instance that a computer is screwed up - a reimage takes less than 5 minutes.
Admin passwords are kept private and the admin accounts can only log in to workstations in our (locked) office (different network segment).
We're pretty confident in our network security and challenge the kids to hack into it.![http://forums.massassi.net/html/smile.gif [http://forums.massassi.net/html/smile.gif]](http://forums.massassi.net/html/smile.gif)
Raynar
</font>
Ok, I'm on the other side of the fence in this situation. I'm one of the network admins at a private school here in Oz.
Using Windows 2000 security policies, we've got the student workstations tighter than a deep sea fish's bumhole. The local drives are read-only apart from a single directory. User's desktops are stored in their user directory on the network. The kids can screw up their own directory and nothing else.
In the very rare instance that a computer is screwed up - a reimage takes less than 5 minutes.
Admin passwords are kept private and the admin accounts can only log in to workstations in our (locked) office (different network segment).
We're pretty confident in our network security and challenge the kids to hack into it.
![http://forums.massassi.net/html/smile.gif [http://forums.massassi.net/html/smile.gif]](http://forums.massassi.net/html/smile.gif)
Raynar
</font>
I have a script on my computer that will not only disable all Windows 2000 policy restrictions, but will also delete all accounts on the policy server with Administrator user profiles. Oh, and of course, you can run this on a restricted system, without any administrator passwords. (The script asks whether you want Administrator accounts deleted, I only did it once, when they started to catch on.)
Our school has the same sort of setup as yours. We had the policy system down in 2 weeks, we had the Webmarshall program giving us full access in a month, and a month after that, we managed to remotely uninstall Webmarshall completely. (Although when we did we accidentally lost all internet access. They reinstalled it, got it back up, and we took it down again, this time, without any port blocking, and general internet maintained.)
So Raynar, do not rely on that Windows 2000 policy system, because it's laughably easy to get around.
Anyway, next year, they try again. Webmarshall is back, and in full force. Everything is locked down, and my script stopped working. Me and my security bustin group of friends call a meeting on AIM, and we discuss our plan of attack. What did we discover? We found that you could flood the system with incorrect access requests (disguised as a poor freshman, btw), and it would eventually freeze the policy system on the server. When that happened, Services.exe restarted the policy server, as it should, except for some moronic reason, the settings were not restored. Everyone was given complete access. First thing we did was cover our tracks, deleting everything in the Event Log. We had fun for the day, then went home and got on AIM again. Our programming master of the group wrote a program that would install and run VNC on the remote server, and would automatically open a specific port for VNC to run on, regardless of whether it had been previously disabled. We discovered that the school's hardware routers stopped us from accessing the server from home, but we could still access it via the school network.
Did I mention we all have laptops, and my group of friends all have the ability to command control of any freshman laptop as long as they are on the net? Yeah. The freshmen have new WinXP laptops, and the programming friend just wrote a script that travelled through email that would automatically enable Remote Desktop Sharing and accept all logins. Damn, that was a fun year.
And we still have one more year of terror (Two for some of the guys in the group. They're thinking of starting a legacy in the school, but I'm not concenred about it.)
------------------
"The future is not determined by a throw of the dice, but is determined by the conscious decisions of you and me."
I am addicted to ellipses!!! AHHH!!! ...
Make Sorrowind Worthwhile... join it! http://sorrowind.net