Day 5 Flashcards

1
Q

windows boot process

A

pre-boot, boot, kernel initialization, user mode startup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

pre-boot

A

the BIOS/UEFI loads from firmware and perform preboot sequences.
*UEFI replaces BIOS and allows Windows to install bootladers directly form firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

boot

A

Windows 6* uses bootmgr as a 2nd stage boot loader.
begins execution in real-mode
once loaded, bootmgr switches to protected mode.
reads the boot configuration database (BCD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BCD (boot cont)

A

used to identify the disk controller, disk, and partition location of the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

boot cont.

A

after reading the BCD…

bootmgr starts winload.exe process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

winload.exe (boot cont)

A

queries firmware to gather a list of installed hardware
Loads ntoskrnl.exe and hal.dll
scans drivers for start value of (oxo)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

kernel initialization

A

begins once winload.exe has completed starting boot drivers.
executive managers create their initial objects, type objects and management mechanisms.
Ntdll.dll is mapped into the ntoskrnl.exe address space.
Creates hardware registry key.
Scans services registry for drivers with start value of 0x1).
Starts smss.exe (0) process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

entire boot process

A

refer to page 71 and loose leaf page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

windows services

A

services do not depend on a user and are intended to provide OS features like DHCP, DNS, FTP, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ways in which windows services differ from ordinary applications

A

services run in the background and are not tied to an interactive user.
services do not have a user interface and do not interact with users.
services on 6* architectures run mostly in session 0
services may be configured to auto-start at boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

windows services consist of:

A

service applications, service control programs, SCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

service applications

A

the services themselves!

svchost.exe processes are generic hosts for DLL services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

service control programs (SCPs)

A

programs used to communicate desired service configuration changes to the SCM.
most common is services.msc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SCM

A

manages windows services.
starts, stops, and interacts with all system services.
(services.exe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

service properties

A

viewed through services.msc.
general tab:
services name:name as it appears in the registry
display name: services common name
path: file path to process
startup type: automatic, manual, or disabled

log on tab identifies the service account:
local system
local service
network service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

service registry keys

A

sub keys contain start, type, and error control values

17
Q

start value

A
indicates when and how drivers and/or services are started.
0x0 boot
0x1 system
0x2 automatic
0x3 manual
0x4 disabled
18
Q

delayed autostart

A

may be enabled with a 0x1 or disabled with a 0x0 and used in combination with start value of 0x2

19
Q

type value

A

indicates whether the service executes in its own process or shares other services:
0x10 in a process by itself
0x20 shares a process

20
Q

error control value

A

specifies severity of error if the service or driver fails to start.
what the system does if there is an error

21
Q

command line scp’s

A

psservice.exe, sc.exe, net start and net stop

22
Q

psservice.exe

A

an SCP from the sysinternals suite (not built in) and works locally and remotely

23
Q

sc.exe

A

a built in scp that works locally and remotely

24
Q

net start and net stop

A

built in scp that only works locally

25
Q

local log in

A

refer to page 77 for local log in steps

26
Q

Lan Manager (LM)

A

uses DES hashing
passwords are convert to capital and either padded or reduced to 14 characters.
divided into two, 7 character hashes
does not support time stamps

27
Q

NTLMv1

A

uses MD4 hashing algorithm
supports 127 alphanumeric characters
128 bit encryption
does not use time stamps

28
Q

NTLMv2

A

uses MD5 hashing algorithm
supports 127 alphanumeric characters
128 bit encryption
uses time stamps

29
Q

network login

A

when accessing a remote system, the LSA on a user’s workstation uses current credentials in an attempt to establish identity with the LSA of the remote system. if these credentials do not match, credentials that exist in the remote system’s SAM must be provided to gain access.