Disable Enumeration of SID's

Posted On 2007-02-26 by FortyPoundHead
Tags: General Tip Networking Windows
Views: 1846

One way for an attacker to scope out a target system and, particularly, to identify the Administrator account so they can focus their efforts on the account with the most privileges is to list, or enumerate, the SID''s (serial identifiers) on a Windows machine.

One of the tricks of the trade for hackers when scoping out, or "footprinting", a potential target system is to gain access to list out, or "enumerate", the SID''s (security identifiers) on the system.

Using freely available tools, an attacker can retrieve the SID of a known user on the domain and use the information to target the Administrator account. The last part of the SID is known as the RID (relative identifier) and is pre-determined for certain accounts such as the Administrator and Guest accounts.

Once the SID for any account or system on the domain is discovered, the attacker could substitute the RID for the Administrator account and use other freely available tools to work backwards and discover what the name of the Administrator user account is.

All of this digging is rather exhausting and amateur or novice hackers may not have the knowledge or patience to successfully enumerate the accounts on your system. But, to protect your computer or network from even the more dedicated attackers, you can disable the ability to enumerate the SID''s. Follow these steps:

1. Click Start, Administrative Tools, Local Security Policy (you can also enter secpol.msc at a command prompt or using Start, Run).
2. Click on the + next to Local Policies
3. Click on Security Options
4. On Windows 2000 systems double-click Additional restrictions for anonymous connections in the details pane and select Do not allow enumeration of SAM accounts and shares from the Local policy setting drop-down list.
5. On Windows Server 2003 and Windows XP systems select Network access: Allow anonymous SID/Name translation in the details pane and make sure the policy is disabled.
6. Click OK and close the console.

You can also apply the policy across a domain instead of on one individual computer by following these steps:

1. Open the Active Directory Users and Computers console screen.
2. Right-click the domain and select Properties.
3. Click the Group Policy tab.
4. Click the Default Domain Policy, and select Edit.
5. Drill down through the console pane to Computer Configuration, Windows Settings, Security Settings, Local Policies, Security Options.
6. On a Windows 2000 domain, double-click Additional restrictions for anonymous connections. Click the Define this policy option. On the drop-down list, select Do not allow enumeration of SAM accounts and shares.
7. On a Windows Server 2003 domain, double-click Network access: Allow anonymous SID/Name translation and make sure the policy is disabled.
8. Click OK and close the console.

About the Author

FortyPoundHead has posted a total of 1974 articles.


Comments On This Post

No comments on this post yet!

Do you have a thought relating to this post? You can post your comment here. If you have an unrelated question, you can use the Q&A section to ask it.

Or you can drop a note to the administrators if you're not sure where you should post.

Your IP address is:

Before you can post, you need to prove you are human. If you log in, this test goes away.

Recent Forum Posts

Advanced search added
dwirch posted on September 23, 2017 at about 13:44 in Site News

Job Spammer: Gaurav Mehta - AgreeYa Solutions
dwirch posted on September 22, 2017 at about 10:35 in Spammers

Job Spammer: Prutha Siri - Javelin Systems
dwirch posted on September 10, 2017 at about 6:15 in Spammers

New security implemented
dwirch posted on September 7, 2017 at about 7:16 in Site News

Malicious IP Checker Companion Tool
dwirch posted on August 12, 2017 at about 20:24 in Site News

Job Spammer: Steve Adams
dwirch posted on August 8, 2017 at about 7:44 in Spammers