nt-part2_7
Analysis of the Security of Windows NT
1 March 1999
7
List of Figures
FIGURE 1.
NT system overview.........................................................................12
FIGURE 2.
Drivers for different file systems......................................................17
FIGURE 3.
Communication between a network redirector and a server ............20
FIGURE 4.
The OSI layered model.....................................................................21
FIGURE 5.
NT communication architecture .......................................................22
FIGURE 6.
The structure of a SMB ....................................................................27
FIGURE 7.
Connecting to an exported service ...................................................28
FIGURE 8.
Disconnecting from an exported service ..........................................29
FIGURE 9.
A sample RAS configuration ...........................................................30
FIGURE 10.
Connecting two LANs using RAS as gateway.................................31
FIGURE 11.
A typical PPTP connection ..............................................................32
FIGURE 12.
Schematic view of the login procedure: step 1.................................36
FIGURE 13.
Schematic view of the login procedure: step 2.................................36
FIGURE 14.
Schematic view of the login procedure: step 3.................................37
FIGURE 15.
Schematic view of the login procedure: step 4.................................37
FIGURE 16.
Passthrough authentication in Windows NT ....................................39
FIGURE 17.
The DC discovery process................................................................80
FIGURE 18.
Setup of secure channel ....................................................................81
FIGURE 19.
NetMon trace of the domain logon process part 1 ...........................82
FIGURE 20.
NetMon trace of the domain logon process part 2 ...........................83