当前位置:网站首页>Build domain environment (win)
Build domain environment (win)
2022-07-06 14:03:00 【Lazy and talented】
Catalog
Common domain environments use :win2012 win7 win2003
Ben blog Environmental Science :Windows Server 2012 R2 and Win2008
1.Window Server 2012 R2 Server configuration
1) Change computer name DC( The computer used to store the active directory database )
3) Install domain controller (AD DS) and DNS service
4) Upgrade the server Click on the above “ Triangle exclamation point ”
5) add to Active Directory user
2.Win2008 Computer configuration
1) Set up DNS Resolve to server IP
2) adopt cmd ping DNS See if the configuration is successful
3) take win2008 Join in win2012 Created domain
4) Successfully joined the domain cai.yulab
Common domain environments use :win2012 win7 win2003
Server 2012 R2、Window7 perhaps Server 2003 The operating system Windows Domain environment .
Ben blog Environmental Science :Windows Server 2012 R2 and Win2008
MSDN, I tell you - Make a quiet tool station (itellyou.cn)https://msdn.itellyou.cn/
1.Window Server 2012 R2 Server configuration
1) Change computer name DC( The computer used to store the active directory database )
Restart after the change
2) Setup server IP,DNS
Set up IP by 192.168.1.11( Don't set 192.168.1.1 It may overlap with the physical machine ip)
The subnet mask is 255.255.255.0
DNS Set to 192.168.1.11(win2012 As a server Set this IP)
3) Install domain controller (AD DS) and DNS service
Sign in win2012 The server , You can see " Server Manager " window
0x01、 single click “ Add roles and features ” , Get into “ Add color correction and Function Wizard ” Interface . Again “ Before the start ” part , default setting .
single click “ next step ”, Get into “ Installation type ” part , choice “ Role based or feature-based installation ” Options .
single click “ next step ”, Get into “ Server selection ” part . default setting
single click “ next step ”, Check “Active Directory Domain services ” and “DNS The server ”.
stay “ function ” Interface default settings . Default 、 Default
single click “ next step ”, Get into “ confirm ” part . next step wait for 2 minute restart
4) Upgrade the server Click on the above “ Triangle exclamation point ”
Click on “ Promote this server to a domain controller ”.
Get into “Active Directory Domain services configuration wizard ”
choice “ Add new forest ” , The root domain name should conform to DNS Domain name resolution
wait for 2 minute
Once again into the “ Server Manager ”
Dashboard pull-down ,AD DS And DNS Have been configured
5) add to Active Directory user
The right choice “Active Directory Users and computers ”
Right click ”Users“, add to “ new user ”, Set the password
2.Win2008 Computer configuration
1) Set up DNS Resolve to server IP
IP The address and the server remain in the same network segment
2) adopt cmd ping DNS See if the configuration is successful
3) take win2008 Join in win2012 Created domain
Click on “ Domain ”, Click on “ determine ”
Enter the account and password set by the domain administrator
4) Successfully joined the domain cai.yulab
5) After the creation is successful, you can go to win7 Log in to the domain with the domain user account
Commonly known as intranet penetration testing , To a large extent, it is domain penetration testing , Build a domain test environment , stay windows Under the active directory environment of , Master its fabrication method and operation mechanism , It is of great help to the security maintenance of the intranet .
Don't understand private letters Lazy and talented
Details refer to :《 Intranet security attack and defense - Penetration test guide 》—— Xu Yan
边栏推荐
- canvas基础2 - arc - 画弧线
- Matlab opens M file garbled solution
- It's never too late to start. The tramp transformation programmer has an annual salary of more than 700000 yuan
- TypeScript快速入门
- Implementation principle of automatic capacity expansion mechanism of ArrayList
- Detailed explanation of redis' distributed lock principle
- Interpretation of iterator related "itertools" module usage
- 7-9 制作门牌号3.0(PTA程序设计)
- Callback function ----------- callback
- 简单理解ES6的Promise
猜你喜欢
Hackmyvm target series (5) -warez
Have you encountered ABA problems? Let's talk about the following in detail, how to avoid ABA problems
"Gold, silver and four" job hopping needs to be cautious. Can an article solve the interview?
Differences among fianl, finally, and finalize
小程序web抓包-fiddler
xray与burp联动 挖掘
撲克牌遊戲程序——人機對抗
记一次猫舍由外到内的渗透撞库操作提取-flag
Strengthen basic learning records
Matlab opens M file garbled solution
随机推荐
Why use redis
Mode 1 two-way serial communication is adopted between machine a and machine B, and the specific requirements are as follows: (1) the K1 key of machine a can control the ledi of machine B to turn on a
Difference and understanding between detected and non detected anomalies
实验九 输入输出流(节选)
7-4 散列表查找(PTA程序设计)
Leetcode. 3. Longest substring without repeated characters - more than 100% solution
【VMware异常问题】问题分析&解决办法
【头歌educoder数据表中数据的插入、修改和删除】
Experiment 9 input and output stream (excerpt)
Detailed explanation of redis' distributed lock principle
MATLAB打开.m文件乱码解决办法
canvas基础1 - 画直线(通俗易懂)
Hackmyvm target series (5) -warez
7-15 h0161. 求最大公约数和最小公倍数(PTA程序设计)
Write a program to simulate the traffic lights in real life.
3. Input and output functions (printf, scanf, getchar and putchar)
Renforcer les dossiers de base de l'apprentissage
"Gold, silver and four" job hopping needs to be cautious. Can an article solve the interview?
【数据库 三大范式】一看就懂
Interpretation of iterator related "itertools" module usage