Notices
Computer & Technology Related Post here for help and discussion of computing and related technology. Internet, TVs, phones, consoles, computers, tablets and any other gadgets.

Windows 2000 shutdown code???

Thread Tools
 
Search this Thread
 
Old Aug 26, 2004 | 12:25 PM
  #1  
ScoobySnack's Avatar
ScoobySnack
Thread Starter
Scooby Regular
 
Joined: Dec 2001
Posts: 2,569
Likes: 0
From: Cheshire
Default Windows 2000 shutdown code???

Just upload and installed some Windows 2000 patches, all went well...

Sysytem reboots, but after the windows screen comes up with a dialogue saying something about NT authroisation shutdown code 128 after 1 minute. It then shutsdown and reboots. Keep happening over and over

Any ideas how to solve it?

Cheers

J
Reply
Old Aug 26, 2004 | 12:32 PM
  #2  
Nicks VR4's Avatar
Nicks VR4
Scooby Regular
 
Joined: May 2003
Posts: 1,165
Likes: 0
Default

From M$ site

http://support.microsoft.com/?kbid=318447

If it not this you may have Sasser or Blaster Virus

Nick
Reply
Old Aug 26, 2004 | 02:11 PM
  #3  
ScoobySnack's Avatar
ScoobySnack
Thread Starter
Scooby Regular
 
Joined: Dec 2001
Posts: 2,569
Likes: 0
From: Cheshire
Default

Originally Posted by Nicks VR4
From M$ site

http://support.microsoft.com/?kbid=318447

If it not this you may have Sasser or Blaster Virus

Nick

Spot on Nick , i've printed the resolution and will try it as soon as I get in....

Cheers very much

J
Reply
Old Aug 28, 2004 | 10:01 AM
  #4  
ScoobySnack's Avatar
ScoobySnack
Thread Starter
Scooby Regular
 
Joined: Dec 2001
Posts: 2,569
Likes: 0
From: Cheshire
Default

New problem

I know I have to adjust regedit, but I can't get to it. The computer boots up and goes into shutdown even in Safe Mode..

Any idea how to get into regedit... or break the loop of shutting down?

Cheers

J
Reply
Old Aug 28, 2004 | 11:09 AM
  #5  
Nicks VR4's Avatar
Nicks VR4
Scooby Regular
 
Joined: May 2003
Posts: 1,165
Likes: 0
Default

You could try using McAfee's stinger to get rid if you can download off another machine and put on floppy and run it

Or try this off M$ site

On Windows 2000 systems, to prevent LSASS.EXE from crashing (thereby restarting the operating system) unplug the network cable (or disable the network adapter before LSASS.EXE crashes) and then perform any one of the following steps to prevent the worm from crashing LSASS.EXE:

1.
Create a file called %systemroot%\debug\dcpromo.log and make the file read-only. To do this, type the following command:

echo dcpromo >%systemroot%\debug\dcpromo.log & attrib +r %systemroot%\debug\dcpromo.log

NOTE: This is the most effective mitigation technique as it completely mitigates this vulnerability by causing the vulnerable code to never be executed. This work-around will work for packets sent to any vulnerable port.

2.
Enable advanced TCP/IP filtering on all adapters to block all un-solicited inbound TCP packets

• Go to Start, Run and type Control and press enter

• In the new Control Panel window double click on Network and Dialup Connections

• Right click on the adapter that is connected to the Internet or the infected network and select Properties

• Double click Internet Protocol (TCP/IP)

• Click Advanced

• Select the Options tab

• Double click TCP/IP filtering

• Check the Enable TCP/IP filtering (all adapters) checkbox

• Select the Permit Only button above TCP Ports

NOTE: Do NOT add any ports to this list and do NOT select the Permit Only button above the UDP Ports label.

• Press OK 4 times and then select Yes when prompted to reboot the system (you must reboot for these settings to take effect)


This is an alternate mitigation technique that can be used to block all attempts to exploit the vulnerability via the TCP protocol. This will not prevent malformed UDP packets from reaching a vulnerable port and does not completely block the vulnerability like the steps outlined above.

3.
Temporarily stop the server service by typing the following command line:

net stop server /y

NOTE: This technique will only block exploit attempts that occur via TCP 139 and 445.


If the machine is currently infected with the Sasser worm it may start flooding the local network connection as soon as the cable is plugged back in making it impossible to download updates. To temporarily disable the worm use Task Manager to kill the following processes:

• End any process beginning with 4 or more numbers and “_up.exe” (for example, 12345_up.exe)

• End any process starting with avserve (for example, avserve.exe, avserve2.exe)

• End any process named skynetave.exe

• End any process named hkey.exe

• End any process named msiwin84.exe

• End any process named wmiprvsw.exe

NOTE: Do not end the process named wmiprvse.exe it is a legitimate system process.


After stopping the worm processes you should be able to download the security update and a Sasser removal tool.
Reply
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
KAS35RSTI
Subaru
27
Nov 4, 2021 07:12 PM
Mattybr5@MB Developments
Full Cars Breaking For Spares
12
Nov 18, 2015 07:03 AM
Sam Witwicky
Engine Management and ECU Remapping
17
Nov 13, 2015 10:49 AM
FuZzBoM
Wheels, Tyres & Brakes
16
Oct 4, 2015 09:49 PM
Ganz1983
Subaru
5
Oct 2, 2015 09:22 AM




All times are GMT +1. The time now is 01:23 PM.