This is a great article on DNS Scavenging
#DNS #AD #Windows
This is a great article on DNS Scavenging
#DNS #AD #Windows
I was working on migrating VM’s via Hyper V cluster failover remotely, and a college asked if there was a way to Shadow. We tried both connecting to 1 host via logmein with no luck. I searched and found a way to shadow via RDP.
1.) I was log’d host via logmein (could easily be RDP)
2.) I then created another domain admin user called test since I was on as administrator. They logged into another host on the same network via logmein as the test user
3.) Then they RDP’d as the user test to the server I was logged into as administrator
4.) I opened remote desktop services manager and looked to see the session number administrator was logged in as (it was session 3)
5.) They opened command prompt (right clicked run as administrator). In the command prompt they typed: shadow 3
6.) I was prompted “Do you want to relinquish control” which I did.
7.) They could then see my desktop and do whatever in it, but I couldn’t see
8.) I X’d out and reconnected and we were golden.
9.) + stops the shadow
For more info, see: http://support.microsoft.com/kb/278845
#Windows #RDP
The following will set the client to use DHCP:
netsh interface ip set address “Local Area Connection” dhcp
Unfortunately, you will need to do the same with DNS as well (otherwise it remains statically assigned)
netsh interface ip delete dns “Local Area Connection” all
Place that in GPO as a startup script after testing.
Found the following online on Novell’s site and it worked perfectly (link below)
Copy the disk to a pc with virtualbox installed the convert with:
c:\Program Files\Oracle\VirtualBox>VBoxManage convertfromraw c:\be\disk0-test.ra
w test.vhd –format VHD
Then copy the vhd to hyperv and do it
1. Boot the target machine into rescue mode, using appropriate boot media
2. Run the following command to determine which devices are /, /boot and swap:
fdisk -l
3. Using that information mount the appropriate devices:
mount /dev/%root device% /mnt
mount /dev/%boot device% /mnt/boot
mount –rbind /proc /mnt/proc
mount –rbind /sys /mnt/sys
mount –rbind /dev /mnt/dev
4. Change the system root to the newly selected location:
chroot /mnt
5. Modify the /etc/fstab file to make sure the correct devices are being used. For example the root, boot, and swap devices might be listed with these device names:
/dev/sda1
/dev/sda2
/dev/sda3
According to the fdisk -l output, however, the devices should be listed as follows:
/dev/cciss/c0d0p1
/dev/cciss/c0d0p2
/dev/cciss/c0d0p3
6. Modify the /boot/grub/menu.lst file and replace the boot partition information with the correct device id. For example, the boot partition may be listed as this device:
/dev/sda2
Where it should be this device:
/dev/cciss/c0d0p2
7. Make sure that the /var/tmp directory exists and then run the following command (note: the /var/tmp directory may need to be manually created first):
mkinitrd
8. Reboot the target machine
In-case you like windows run line commands:
.msc shortcuts
AD Domains and Trusts
domain.msc
Active Directory Management
admgmt.msc
AD Sites and Services
dssite.msc
AD Users and Computers
dsa.msc
ADSI Edit
adsiedit.msc
Authorization manager
azman.msc
Certification Authority Management
certsrv.msc
Certificate Templates
certtmpl.msc
Cluster Administrator
cluadmin.exe
Computer Management
compmgmt.msc
Component Services
comexp.msc
Configure Your Server
cys.exe
Device Manager
devmgmt.msc
DHCP Management
dhcpmgmt.msc
Disk Defragmenter
dfrg.msc
Disk Manager
diskmgmt.msc
Distributed File System
dfsgui.msc
DNS Management
dnsmgmt.msc
Event Viewer
eventvwr.msc
Indexing Service Management
ciadv.msc
IP Address Manage
ipaddrmgmt.msc
Licensing Manager
llsmgr.exe
Local Certificates Management
certmgr.msc
Local Group Policy Editor
gpedit.msc
Local Security Settings Manager
secpol.msc
Local Users and Groups Manager
lusrmgr.msc
Network Load balancing
nlbmgr.exe
Performance Monitor
perfmon.msc
PKI Viewer
pkiview.msc
Public Key Management
pkmgmt.msc
Quality of Service Control Management
acssnap.msc
Remote Desktop
tsmmc.msc
Remote Storage Administration
rsadmin.msc
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Routing and Remote Access Manager
rrasmgmt.msc
Resultant Set of Policy
rsop.msc
Schema management
schmmgmt.msc
Services Management
services.msc
Shared Folders
fsmgmt.msc
SID Security Migration
sidwalk.msc
Telephony Management
tapimgmt.msc
Terminal Server Configuration
tscc.msc
Terminal Server Licensing
licmgr.exe
Terminal Server Manager
tsadmin.exe
Teminal Services RDP MSTSC
Teminal Services RDP to Console mstsc /v:[server] /console
UDDI Services Managment
uddi.msc
Windows Mangement Instumentation
wmimgmt.msc