This is a quick-and-dirty method for kludging NTLM authentication (aka ActiveDirectory) into Apache 2, for purposes of doing HTTP authentication. Assuming you can get it running after following the steps below, you should be able to configure access files under Apache that will direct the webserver to authenticate HTTP users against a domain of your choosing. The server does not have to be joined to the domain.
- Checkout latest mod_ntlm module from the SourceForge CVS repository:
cvs -d:pserver:email@example.com:/cvsroot/m<wbr>odntlm checkout mod_ntlm
- Change to the mod_ntlm directory created by the checkout process
- Edit configure.in so that the “/usr/include/apache2” directory points to where you have your Apache 2.0 header files located.
HINT: You’ll either need to have the Apache 2.0 source installed, or have an httpd-devel-* RPM of some sort installed.
- Also modify configure.in so that the path for apxs is correct. The default of “/usr/sbin/apxs2” is probably not correct, but Your Mileage May Vary.
- Run autogen.sh and cross your fingers (If first run of autogen.sh fails with a syntax error on line 33, remove trailing backslash from the “for” loop on the line above. Re-run the autogen.sh script)
- Assuming the autogen.sh script has succesfully run all the way, you should have a bunch of new files in your mod_ntlm directory, including a current Makefile
- Run make and watch some warning messages float by
- Look in the .libs directory and see if you now have mod_ntlm.so
- Copy the mod_ntlm.so from the .libs directory into the main mod_ntlm directory
- Do a make install
- If make install fails, manually install module
- copy mod_ntlm.so to your Apache 2.0 modules directory (/usr/include/httpd/modules)
- chmod 755 mod_ntlm.so (in it’s new location)
- Edit Apache 2.0 configure file to include a loadmodules line for this new module: LoadModule ntlm_module modules/mod_ntlm.so
- Restart apache (apachectl reload)
And that about does it. Of course NTLM authentication isn’t secure, but you can try doing it over HTTPS. Except it won’t work with Internet Explorer under HTTPS. But it does with Firefox. Why am I not surprised?
Only real disappointment is the lack of ability to do NTLM group authentication. Oh well…
IMPORTANT NOTE:The information presented here is to be used only for legitimate cases of access loss. Using these instructions to gain access to a system without permission is a violation of both state and Federal law.
At one of my old jobs as a security engineer, I was asked to find the admin password for an application (seems the company had managed to lay off everyone who actually knew it). This is an example of an “ethical hack”, where techniques used by malicious people have legitimate application in the real world
TestDirector 7.6 stores all it’s usernames, passwords, groups, and other metadata in MS Access databases. Now the standard database for the users is usually something like “Testdir.mdb” somewhere in the directory tree of the application suite. However, the admin password is usually stored in a database called “doms.mdb” which you should find in “c:program filescommon filesmercury interactiveDomsinfo”.
If you have never read John Brunner‘s novel “The Shockwave Rider“, I strongly recommend you do so at your earliest opportunity. Published in 1975, the novel is a fictional story about a man in a future society dominated by computer networks, corrupt governments and social upheaval. Key to the book’s plot is the division between what information government authorities can access and the information citizens can see.
In many ways the book mirrors the situation we live in today. In fact, “The Shockwave Rider” is so keenly accurate in its predictions that it’s somewhat unnerving (Brunner even coined the term “worm” to refer to a computer program that moves through a network of computers and makes changes). Vast oceans of data exist across societies throughout the world. Databases compiled by corporations, non-profits and governments store meticulous details about all of us. And in our world today there is no data access balance between “regular joes” and those governmental and corporate entities. Because data about people is so especially valuable, that divide represents a power imbalance.
Welcome to JediMercer.com, a site that I hope you will fine useful in your pathway to enlightenment. If you are here seeking truth and knowledge, then please browse through the articles and projects.
If, however, you are merely trying to figure out who I am, I suggest looking into clicking on the About section.