Change the strong password policy of Windows 2003

We may encounter the following error when using a simple password for a user in Active Directory:
Windows cannot set the password for <user> because: The password does not meet the password policy requirements. Check the minimum password length, password complexity and password history requirements.

We can change the password policy of Windows Server 2003.
The detail steps are introduced in:
http://www.tacktech.com/display.cfm?ttid=354

Maybe we need to restart system to apply the changed security policy.

 

<REPORT> <SCANINFO TOOLNAME="XXXX" MAKERS="XXXX" POLICY="XXXX" SCANTASK="" SCANTIME="" FILE_ID=""/> <!-- TOOLNAME="扫描工具名称" MAKERS="工具厂商名称" POLICY="策略版本" SCANTASK="任务名称" SCANTIME="扫描时间" FILE_ID="文件ID(没啥大用处其实)" --> <SCANDATA TYPE="OS"> <HOST IP="192.168.0.100"> <!-- *IP地址: --> <OSTYPE>WINDOWS</OSTYPE> <!-- 操作系统类型:Windows、Linux、.... --> <OSVERSION>Windows Server 2008</OSVERSION> <!-- 操作系统版本:Windows 2008、RedHat 9、.... --> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号",没有编号可用NONE标识 --> <VULTYPE>缓存区溢出</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <!-- 端口: --> <RISK>中</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> > <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> <HOST IP="102.168.20.20"> <OSTYPE>LINUX</OSTYPE> <OSVERSION>RED HAT 9</OSVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness ]]> </NAME> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>缓存区溢出</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> </SCANDATA> <SCANDATA TYPE="DB"> <HOST IP="102.168.20.20"> <PORT>1433</PORT> <DBTYPE>Microsoft SQL Server</DBTYPE> <DBVERSION>Microsoft SQL Server 2008 R2</DBVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Easily-guessed password ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="MS13-112" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> <HOST IP="102.168.100.11"> <PORT>1433</PORT> <DBTYPE>Microsoft SQL Server</DBTYPE> <DBVERSION>Microsoft SQL Server 2008 R2</DBVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Easily-guessed password ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <NO CVE="NONE" CNVD="NONE" MS="MS13-112" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> </SCANDATA> <SCANDATA TYPE="WEB"> <HOST WEB="HTTP:\\WWW.TEST.COM"> <WEBSERVERBANNER>Apache tomcat</WEBSERVERBANNER> <!-- Web Server Banner信息, --> <SERVERVERSION>Microsoft Windows 2008 R2</SERVERVERSION> <!-- 服务器信息 --> <TECHNOLOGIES>JSP</TECHNOLOGIES> <!-- 使用语言 --> <DATA> <VULNERABLITY> <NAME> <![CDATA[ SQL注入漏洞 ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>注入类</VULTYPE> <!-- 漏洞类型:如注入类、跨站脚本类、信息泄露类、弱口令/默认口令类、系统/服务漏洞类、权限/配置设置不当类、产品漏洞类、其他类 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> <DETAILS> <URL URL="HTTP:\\WWW.TEST.COM?DETAILS=100"> <!-- *存在漏洞的url --> <TYPE>STRING</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ DETAILS=100' AND '1'='1 ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <!-- 接收的request --> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> </URL> <URL URL="HTTP:\\WWW.TEST.COM?id=120"> <!-- *存在漏洞的url --> <TYPE>INT</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ ID=100 AND 1=1 ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> <!-- 接收的request --> </URL> </DETAILS> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ 跨站脚本 ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>跨站脚本类</VULTYPE> <!-- 漏洞类型:如注入类、跨站脚本类、信息泄露类、弱口令/默认口令类、系统/服务漏洞类、权限/配置设置不当类、产品漏洞类、其他类 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> <DETAILS> <URL URL="HTTP:\\WWW.TEST.COM?DETAILS=100"> <!-- *存在漏洞的url --> <TYPE>反射性</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ DETAILS=100%20%3C%73%63%72%69%70%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <!-- 接收的request --> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> </URL> </DETAILS> </VULNERABLITY> </DATA> </HOST> </SCANDATA> </REPORT>生成的xml为次格式
08-23
【无人机】基于改进粒子群算法的无人机路径规划研究[和遗传算法、粒子群算法进行比较](Matlab代码实现)内容概要:本文围绕基于改进粒子群算法的无人机路径规划展开研究,重点探讨了在复杂环境中利用改进粒子群算法(PSO)实现无人机三维路径规划的方法,并将其与遗传算法(GA)、标准粒子群算法等传统优化算法进行对比分析。研究内容涵盖路径规划的多目标优化、避障策略、航路点约束以及算法收敛性和寻优能力的评估,所有实验均通过Matlab代码实现,提供了完整的仿真验证流程。文章还提到了多种智能优化算法在无人机路径规划中的应用比较,突出了改进PSO在收敛速度和全局寻优方面的优势。; 适合人群:具备一定Matlab编程基础和优化算法知识的研究生、科研人员及从事无人机路径规划、智能优化算法研究的相关技术人员。; 使用场景及目标:①用于无人机在复杂地形或动态环境下的三维路径规划仿真研究;②比较不同智能优化算法(如PSO、GA、蚁群算法、RRT等)在路径规划中的性能差异;③为多目标优化问题提供算法选型和改进思路。; 阅读建议:建议读者结合文中提供的Matlab代码进行实践操作,重点关注算法的参数设置、适应度函数设计及路径约束处理方式,同时可参考文中提到的多种算法对比思路,拓展到其他智能优化算法的研究与改进中。
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值