We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents d312484 + b057174 commit d963527Copy full SHA for d963527
MsTelnetServer_NTLM_Guest.txt
@@ -47,7 +47,7 @@ LM/NTLM responses, domain, username, workstation, and session key fields, combin
47
with NEGOTIATE_ANONYMOUS and NEGOTIATE_NTLM flags (0x00000A01). This message,
48
generated by the client in security.c's DoNTLMAuth function (used by telnetguest.exe),
49
is accepted, mapping to the Guest account SID, bypassing the Guest login restriction
50
-enforced in session.cpp's ParseAndValidateAccount. Post-authentication, session.cpp's
+enforced in iohandlr.cpp's ParseAndValidateAccount. Post-authentication, session.cpp's
51
CheckGroupMembership function requires the account to be in the TelnetClients group
52
for session authorization; otherwise, access is denied. If the Guest account is in
53
the TelnetClients group, the session proceeds to terminal negotiation, but may fail
0 commit comments