Recommended Posts

hey guys

 

our IT department have sent us a batch file to run to set up a drive and map it

 

this is the code

@echo off 
set /P id=Please enter your user name: 
echo Thanks. 
echo In a few seconds you will need to enter your username and password again. 
echo Please include FPA\ at the beginning of your username...
net use f: \\***.***.***.***\home$\%id%
echo press enter to exit

I understand it setting the id for the share to be added but i dont understand what adding the FPA\username is doing

 

can you enlighten me, the script seems to work for some but not others

Link to comment
https://www.neowin.net/forum/topic/1161650-network-share-script/
Share on other sites

Why should they need to do this - if their machine is part of the domain, then there would be not reason to auth via this method.

 

All you should have to do is access the share name.

 

Clearly something is odd here...  There should normally be no need for such a script.

yeah i am not sure why it works like that i am just a Peon here although a peon that seems to be able to fix issues quicker than IT can

 

thanks for the help guys

 

Its accessing through citrix if that helps budman

Citrix is not part of the domain?  Again failed way of doing it!  Even when you use citrix you should be logging in with your domain creds and therefore be able to auth to any share you have permissions too without issue and no need to send creds again.  To access a share all you should have to do is

 

\\hostnameorIPorFQDN\sharename

 

And you should be good..

 

And you using IP to access the share?  So you don't even have name resolution working?  WTF kind of place is this?

Surely it should be setup to run as part of a GP and then either assigned to an OU or security group. This way it will automatically map when the user logs on.

 

Hell, most of my users don't know their username, they just switch on the machine and type their password!

 

Looking at it, it looks like its a user folder that can be mapped in Active Directory.

 

post-273740-0-31186500-1372432094.jpg

 

No reason for Citix not to be part of the domain, only increases workload and reduces security.

Is that batch file run automatically when the user logs in or do you have to launch it explicitly? When I was in college I worked for my university's IT department, and they did something very similar with their XP and Vista images. There was a VB script that ran automatically on startup to map printers, map network shares, and try to activate the VPN if the staff member was off-campus. It was more complex than the script you posted: it would automatically retrieve the user's username and authenticate everything with their domain credentials. It was also one of those "black magic" things that as far as I could tell no one in the department really understood. It "just worked" - most of the time. Fortunately we started doing things the right way and got rid of the script when we deployed Windows 7. In short, I agree with BudMan: something is not configured properly.

Not wanting to shoot you, an for sure not blaming you for the mess your having to deal with.

 

but there is not much too that script

 

Its a simple net use

 

so for example

 

C:\>net use * \\10.56.132.54\ipc$
Drive Z: is now connected to \\10.56.132.54\ipc$.

The command completed successfully.

 

I connected to the ipc$ share without having to auth, because I am already logged into the domain.  If the creds sent automatically do not work then you will get prompted.

 

If you get prompted when you attempt to use net use, then the creds your logged into the machine with do not have permissions.  So you need to send different creds.

 

Now where you can run into issues with this is - you can only be authed to a server with 1 username and password.  So if you were allowed to access anything on that server as your logged in username or anonymously..  You would then not be able to auth via some other account name and password be it local to where you trying to access or a domain creds, etc..

 

What might help us troubleshoot is output of just running command directly

 

net use f: \\***.***.***.***\home$\%id%

 

with replacing %ID% with your username, like so

 

net use f: \\***.***.***.***\home$\budman

 

Do you get prompted - if so put in your password, what does it say.. What errror or error number?

 

putting in fpa\budman would not be valid in the above context.. that would be like access directory home$\fpa\budman

 

Which I guess could be valid - but if that is the case.. Maybe there is no domain involved?  How about output of net view \\ipaddressorhostname\home$

 

the $ on the end tells us its a HIDDEN share.. like admin$ or IPC$, etc.

 

What do you get if you just do net view \\ipaddress you snipped out.. BTW if your using private IPs 10.x.x.x or 192.168.x.x or 172.16-31.x.x there is little point in hiding those..

 

The other problem I see with that command is your trying to map a drive letter to a folder under a share??

 

net use f: \\***.***.***.***\home$\%id%

 

Where home$ is the share and %ID% is some directory..  You don't do that - you map to a share directly, not to a sub folder.  So that could be a problem for sure!

 

So normally you would use

 

net use f: \\***.***.***.***\%id%

 

Where there is share with your username on it.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Posts

    • Will be available in EventViewer. Suppose they could have also displayed upon next log-on (same as 'didn't shutdown properly' on servers) but seems not.
    • PasteBar 0.7.0 by Razvan Serea PasteBar is a powerful yet free clipboard manager that revolutionizes how you copy, organize, and reuse information. Packed with smart features, it enhances productivity and simplifies your workflow by minimizing repetitive copy-paste tasks—so you can work faster and smarter. PasteBar offers powerful clipboard management with unlimited history, searchable copy records, and note support, making it easy to retrieve past clips. You can save and organize clips into custom collections, tabs, or boards for quick access through intuitive paste menus. Privacy is a priority, with local storage, passcode protection, and PIN-locked collections ensuring your data stays secure. The app also supports custom storage locations, giving you full control over where your clipboard history is saved. Beyond basic clipboard functions, PasteBar includes smart features like support for text, images, files, and code snippets—complete with syntax highlighting and Markdown formatting. A global search function, instant pasting, and dark theme enhance usability, while customization options let you tailor hotkeys, tray behavior, and text filters. Cross-platform compatibility (macOS & Windows) ensures seamless workflow integration, with added tools for web scraping, API data extraction, and multi-language support. Backup and restore capabilities provide extra peace of mind, making PasteBar a versatile productivity tool. PasteBar 0.7.0 changelog: Added backup and restore database and images Added custom data location to store application data in a folder of your choice instead of the default location Added keyboard shortcuts to improve navigation efficiency within the application Added long press on clip to activate clips organize Added "Trim Spaces" option for clips and "Auto Trim Spaces" option for History Capture Added Quick history window user options Added option to disable capturing and storing images from clipboard Implemented clipboard history filtering based on text length limits Added support for setting hotkeys with up to 3-key combinations Fixed update history items in quick paste window after delete operation in main window Added user setting for single-click keyboard focus in history Refactored terminology for history window split to open Updated to React 19 and React Compiler Auto-activate search in quick paste window when typing any letter or number Added single-click copy/paste option in user preferences Added persistent note icons for clips with descriptions Added detect and select language modal on first app run Fixed refresh native menu on history items delete Added history item preview max lines user setting Added protected collection with PIN access Added special copy/paste for history items context menu and settings Added global templates in user preferences for saved clips Press Delete key to delete single or multiple items with confirmation on second press Added customizable tray icon behavior on Windows as user settings Added user preference to copy only menu items to clipboard without auto-pasting Fixed enhance value preview logic to fix text overflow Updated French language translation from Jean-Michel Robert Added deleting menu folders with children by moving submenus up one level Fixed user preferences UI color bug for languages Added settings to preserve pinned and starred items when clearing clipboard history Added option "Show Always on Top" for main window Added support for notes matching in global search Added Turkish language translation by AlijonMurodov Updated Chinese translation by katelya77 Download: PasteBar | Portable | ~30.0 MB (Open Source) Download: PasteBar ARM64 | Portable ARM64 Links: PasteBar Website | Screenshot | MS Store Get alerted to all of our Software updates on Twitter at @NeowinSoftware
    • Well, it seems version 4.9 doesn't work well at least when trying to make a WinToGo USB. It ends very fast with an error. Had to use 4.8 instead.
    • Hundreds of printer models with weak password algorithms exposed, no firmware patch possible by Usama Jawad Many people don't think or care about it, but printer security is a pretty important avenue when it comes to evaluating your cybersecurity posture. Last month, it was found that the companion software for Procolored printers was distributing malware. Now, it has been revealed that hundreds of printer models all over the globe are susceptible to attacks targeting their admin credentials. Bleeping Computer has reported that CVE-2024-51978 is a one of the eight printer vulnerabilities recently discovered by security researchers. Combined, these allow authenticated and unauthenticated attackers to discover the default admin password, perform remote code execution (RCE), crash the printer, and leak other sensitive information. Severity ratings go from a score of 5.3 (medium) to 9.8 (critical), indicating that these are pretty severe vulnerabilities. The most dangerous vulnerability in there exposes the default admin password, and primarily affects Brother printers. This is because Brother utilizes a rather weak password generation algorithm that is highly dependent upon the device's serial number and a static salt table. Analysis of the code revealed that the first 16 characters of the serial number are appended with eight bytes from a static salt table, with the results being hashed with SHA256 and Base64-encoded. Finally, the first eight characters are then taken and some of them are replaced with special characters to form the password. The static nature of the password generation algorithm means that an attacker can chain various existing vulnerabilities to get access to your serial number and eventually your default admin password. It is important to note that not all printer models are affected by all of these flaws, but the default admin password exposure does affect 695 models. The breakdown for the number of printer model affected by the eight vulnerabilities is as follows: Brother: 689 Fujifilm: 46 Konica Minolta: 6 Ricoh: 5 Toshiba: 2 Brother has informed the security researchers that it cannot fully remediate the password generation vulnerability through a firmware patch. It can only fix the issue in its next printer models by patching the problem during the manufacturing process. This makes it crucial for customers of affected models to change their default admin password as soon as possible, which is good practice anyway.
  • Recent Achievements

    • Week One Done
      suprememobiles earned a badge
      Week One Done
    • Week One Done
      Marites earned a badge
      Week One Done
    • One Year In
      runge100 earned a badge
      One Year In
    • One Month Later
      runge100 earned a badge
      One Month Later
    • One Month Later
      jfam earned a badge
      One Month Later
  • Popular Contributors

    1. 1
      +primortal
      567
    2. 2
      +FloatingFatMan
      177
    3. 3
      ATLien_0
      169
    4. 4
      Michael Scrip
      127
    5. 5
      Xenon
      119
  • Tell a friend

    Love Neowin? Tell a friend!