HostedDB - Dedicated UNIX Servers

nt-part2_7 Analysis of the Security of  Windows NT 1 March 1999 7 List of Figures FIGURE 1. NT system overview.........................................................................12 FIGURE 2. Drivers for different file systems......................................................17 FIGURE 3. Communication between a network redirector and a server ............20 FIGURE 4. The OSI layered model.....................................................................21 FIGURE 5. NT communication architecture .......................................................22 FIGURE 6. The structure of a SMB ....................................................................27 FIGURE 7. Connecting to an exported service ...................................................28 FIGURE 8. Disconnecting from an exported service ..........................................29 FIGURE 9. A sample RAS configuration ...........................................................30 FIGURE 10. Connecting two LANs using RAS as gateway.................................31 FIGURE 11. A typical PPTP connection ..............................................................32 FIGURE 12. Schematic view of the login procedure: step 1.................................36 FIGURE 13. Schematic view of the login procedure: step 2.................................36 FIGURE 14. Schematic view of the login procedure: step 3.................................37 FIGURE 15. Schematic view of the login procedure: step 4.................................37 FIGURE 16. Passthrough authentication in Windows NT ....................................39 FIGURE 17. The DC discovery process................................................................80 FIGURE 18. Setup of secure channel ....................................................................81 FIGURE 19. NetMon trace of the domain logon process part 1 ...........................82 FIGURE 20. NetMon trace of the domain logon process part 2 ...........................83