Hey guys I am back again with something interesting today. I am going to talk about windows security architecture. You may ask why do we need to know the architecture of an operating system. The answer is if you want to break something then you must know how it works so that you can achieve your target smoothly!
Everyone knows that Windows is the most widely used operating system across the globe. So that means you are going to come across many systems running with Windows OS in your hacking career. That is, this topic which I am going to describe is the must know for you people. In this topic I will be only covering the security architecture not the breaking of it!
Lets get started now…
Windows Security Architecture:
1. LSA : Local Security Authority
2. SRM : Security Reference Monitor
3. SAM : Security Accounts Manager
1. Local Security Authority:
This is your BIOS section where you can put up a password to protect your system from illegal access. BIOS password can be set by entering the BIOS menu by pressing F2 or F8 (Depends on the manufacturer). This BIOS security can be broke in two ways in two different scenarios! This part of breaking into BIOS, I will write in my upcoming posts. Once the cracker has cracked your BIOS password and entered your system then there come the next security reference called SRM, i.e your Security Reference Monitor.
2. Security Reference Monitor:
Here comes your normal Windows login screen where you are asked for the password for the provided username. So now this password can be set up by going to your desktop screen right-click on ‘My Computer’ and click ‘Manage users’ (‘Manage’ for Windows XP). Then click on ‘Local users and Groups’, give your desired password and finally save it!
3. Security Accounts Manager:
This is the password containing file! I have discussed about this in my previous article on Planting Backdoors in Windows (to know more about the file please read the article). If you are capable of screwing up this file then you are done with hacking the Windows system!
But this is not the end because there is something else which very few people know about it, that is “Syskey“! This is also a password security. To enable Syskey go to Run and type Syskey then set the password. As a hacker you must also know that there is a way to break Syskey. That thing I will describe in my upcoming articles.
If you have any comments or any doubts then please feel free to ask below!
Waiting for your response 🙂