Advertisement
TeamBerserk

[01] - #Anonymous [#opNewBlood] Microsoft - Windows - 8 - En

Apr 27th, 2013
1,341
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 28.21 KB | None | 0 0
  1. /====================================================================================\
  2. |      _____   ___     _     __  __   ___   ___   ___   ___   ___   ___   _  __      |
  3. |     |_   _| | __|   /_\   |  \/  | | _ ) | __| | _ \ / __| | __| | _ \ | |/ /      |
  4. |       | |   | _|   / _ \  | |\/| | | _ \ | _|  |   / \__ \ | _|  |   / | ' <       |
  5. |       |_|   |___| /_/ \_\ |_|  |_| |___/ |___| |_|_\ |___/ |___| |_|_\ |_|\_\     |
  6. \====================================================================================/
  7.     | - T E A M B E R S E R K -
  8.     | Corporations, Governments and PsyOps Regarded as Apostles.
  9.     | Without hatred your life is pointless, but this hellfire, isn’t it what supports your legs ?
  10.     | IRC >> IIP->127.0.0.1 6668 << Channel: #TeamBerserk
  11.     | https://www.Twitter.com/TeamBerserk
  12. --------------------------------------------------------------------------------------
  13.  
  14. /=====================================================================================\
  15. |             __ __              _   __             ____  __                __        |
  16. |          __/ // /_____  ____  / | / /__ _      __/ __ )/ /___  ____  ____/ /        |
  17. |         /_  _  __/ __ \/ __ \/  |/ / _ \ | /| / / __  / / __ \/ __ \/ __  /         |
  18. |        /_  _  __/ /_/ / /_/ / /|  /  __/ |/ |/ / /_/ / / /_/ / /_/ / /_/ /          |
  19. |         /_//_/  \____/ .___/_/ |_/\___/|__/|__/_____/_/\____/\____/\__,_/           |
  20. |                     /_/                                                             |
  21. \=====================================================================================/
  22.     | Anonymous Operation: New Blood
  23.     | Articles and Guides written by Gutts of TeamBerserk
  24.     | IRC.AnonNet.ORG - IRC.AnonOps.COM - IRC.AnonPlus.COM - IRC.AnonPlusRadio.COM
  25.     | IRC.AnonSet.COM - IRC.Cryto.NET - IRC.CyberGuerrilla.ORG - IRC.VoxAnon.SE
  26. ---------------------------------------------------------------------------------------
  27.  
  28. /======================================================================================\
  29. |           _       ___           __                      ____  _____                  |
  30. |          | |     / (_)___  ____/ /___ _      _______   / __ \/ ___/                  |
  31. |          | | /| / / / __ \/ __  / __ \ | /| / / ___/  / / / /\__ \                  |
  32. |          | |/ |/ / / / / / /_/ / /_/ / |/ |/ (__  )  / /_/ /___/ /                   |
  33. |          |__/|__/_/_/ /_/\__,_/\____/|__/|__/____/   \____//____/ 8 Enterprise RTM   |
  34. \======================================================================================/
  35.     | Microsoft Windows Operating System - 8 - Enterprise - RTM
  36.     | Local and Remote Security Hardening and Mitigation Techniques for Workstations
  37.     | Updated: 09-10-2013
  38. ----------------------------------------------------------------------------------------
  39.  
  40. HashTags: #Anonymous, #opNewBlood, #Setup, #Security
  41.  
  42. [ Computer Security ] -> [ Operating System Setup and Security ] -> [ Microsoft Windows: 8 Enterprise RTM and Security Packages ]
  43.  
  44. ============================================
  45. + Building a Strong Foundation of Security +
  46. ============================================
  47.  
  48. ** This is the first text/video tutorial of a series of tutorials that we have made for Anonymous Operation: New Blood  **
  49.  
  50. - How to Acquire, For Free, Microsoft Windows 8 Enterprise OS RTM Clean ISO, Security Packages and Secure the Operating System Installation -
  51.  
  52. Requirements:
  53.  
  54. * 2x 4GB USB Sticks
  55. and/or
  56. * 2x 4GB DVD Discs
  57. ---------------------------------------------------------------------------------------
  58.  
  59. /=====================================================================================\
  60. |             ____      __                 __           __  _                         |
  61. |            /  _/___  / /__________  ____/ /_  _______/ /_(_)___  ____               |
  62. |            / // __ \/ __/ ___/ __ \/ __  / / / / ___/ __/ / __ \/ __ \             |
  63. |          _/ // / / / /_/ /  / /_/ / /_/ / /_/ / /__/ /_/ / /_/ / / / /              |
  64. |         /___/_/ /_/\__/_/   \____/\__,_/\__,_/\___/\__/_/\____/_/ /_/               |
  65. \=====================================================================================/
  66.     | Guide Introduction
  67. ---------------------------------------------------------------------------------------
  68.  
  69. Hello there New Blood, if you are reading this it is most likely that you are interested in joining Anonymous.
  70. These articles complete with their video tutorial counterparts will make you Anonymous.
  71.  
  72. Before we begin I would like to explain a few things: it is not a good idea for you to jump right into a Linux distribution because you will end up stuck in an-
  73. environment that is very unproductive due to your lack of knowledge and experience.
  74.  
  75. I'm sure that you in your current stage are quite use to the simple point and click interface and reliability that Microsoft Windows Operating System has provided you so far.
  76. Following these guides and securing your Windows Operating System Installation is an excellent start for you and the principles of the methods within these
  77. guides apply across all Operating Systems including Unix, Mac and Linux.
  78.  
  79. These guides go into great detail about OS Security, OS Integrity, The Command Line, Offensive Security, Defensive Security, Forensics,-
  80. Social Engineering, Operation Security, OS Security Hardening and Basic Hacking.
  81.  
  82. By the time you have finished following these guides and you have been active, productive and you gain more experience you will be a professional-
  83. and the next logical step is to JUMP into Gentoo-Linux Operating System with the Hardened Kernel or Arch-Linux Operating System because by the time you are-
  84. at that point you will have enough experience and knowledge to operate the aforementioned Operating Systems securely, productively and efficiently.
  85.  
  86. The beginning of these guides require that you make the switch to Microsoft Windows 8 Enterprise RTM ( Release To Manufacturer ) Edition.
  87. You need to get this version specifically because it has in it the features required by this guide, these features are:
  88. * Local Security Policy
  89. * Windows Advanced Firewall
  90. * BitLocker Hard Disk Encryption
  91. * and other essential security tools
  92.  
  93. So right now I want you to go and make a backup of all of your personal files, such as your audio files, documents, images and video files-
  94. and whatever else before continuing this first guide.
  95.  
  96. You need to put your files either on a USB Stick if they will fit or another separate hard drive, or online somewhere because you're going to be thoroughly
  97. wiping your hard drive and then FLASHING your BIOS next.
  98.  
  99. It should take you about one day to complete the first 2 guides and when you're finished with all of the guides you will have:
  100. * Stealth and Undetectable Network Ports
  101. * Stealth and Encrypted Internet and Network Traffic
  102. * Stealth and Undetectable DNS
  103. * Stealth and Undetectable Internet/Intranet/Network Presence
  104. * Encrypted Hard Disk Data that not even the NSA, Department of Defense or Department of Justice could crack ( if you want to take it that far ).
  105. * 100% Anonymity
  106. * Protection and Freedom from any and all RATs/Malware/Spyware/Viruses/Adware/Bloatware/Crapware/Keyloggers/etcetera by using Microsoft's Research and Defense EMET Toolkit-
  107.  and with the correct LSP and WAF Configurations.
  108. * Protection against 0Day exploits by using Microsoft's Research and Defense EMET Toolkit
  109. * Excellent Military Grade Local Security
  110. * Excellent Military Grade Remote/Network Security
  111. * Ultimate File Sharing Freedom
  112. * Security against Government and Corporate Snooping
  113. * Ultimate Stability, Integrity and Usability
  114. * and more!
  115.  
  116. You may be asking the question: Why do I need to wipe my hard drive?
  117.  
  118. The answer to this question is: In your noobish naivety chances are that your computer system is already compromised,
  119. especially if you have already been hanging out in AnonOps IRC and other Anonymous affiliated IRC networks and/or you have downloaded pirated software executables,
  120. or executables of any kind given to you from IRC, Online Games, YouTube, MediaFire and etcetera.
  121.  
  122. You may think that you are not compromised because you run an anti-virus program like Malwarebytes or AVG Anti-Virus, but you are sadly mistaken.
  123. There are so many variety of malware out in the wild that have never been detected by or reported to these anti-malware/anti-virus companies which produce this software.
  124.  
  125. Trust me New Blood, I know for a fact that it works exactly as I explained because I run my own botnet and nearly all of my bots are running anti-virus/anti-malware-
  126. software and both the anti-virus/anti-malware software and the users have no clue of the bot presence on their systems.
  127.  
  128. There are also something called RATs ( Remote Administration Tools ) which can be Encrypted with something called a Crypter. A Crypter is an application
  129. that most top botnet operators use to Encrypt their STUBs which basically make the stub executable Encrypted and unreadable.
  130. It's not technically a code cave packed into the executable but it is very similar to that.
  131.  
  132. These encrypted executable RATs evade all detection by any anti-virus/anti-malware program and allow the operator to have FULL control of your system
  133. once it is compromised. The operator can view your desktop, send un-viewable operating system commands to your computer through an invisible shell,
  134. view your web cam without the LED indicator being turned on, sniff and key log your keystrokes, make all connections to and from your system and the RAT master
  135. invisible even when you do a netstat command to list your incoming and outgoing TCP/UDP/IP connections.
  136.  
  137. Essentially if you are compromised then you are 100% fucked. The most expensive Crypters go for about $500 USD and upwards and receive daily updates-
  138. to stay several steps ahead of anti-virus/anti-malware software companies. There even exists this type of malware for Linux and Mac OS.
  139. This type of malware is capable of writing to your BIOS hardware chip on your motherboard and even your video card motherboard BIOS if you have one for LEGACY BIOS-
  140. and it can load into RAM and reinfect your system right at the moment of booting up your Operating System.
  141.  
  142. Ever feel like someone is watching you? Have you ever tried to do something on your computer and you know you're doing it right and it still just won't work?
  143. Do files go missing/corrupted or are things moved around and permissions changed? Does your web cam LED light flash one time very quickly occasionally?
  144.  
  145. If so, I can tell you without a doubt that you are 100% compromised with a stealth and undetectable remote tool and the person(s) behind that remote tool-
  146. are actively spying on you, stealing your financial information, stealing your personal information, using your computer and its bandwidth as part of their botnet.
  147.  
  148. The ONLY way to secure yourself, your Anonymity and your Computer System is to follow this guide and do EVERYTHING described within it and one step after the other in
  149. the exact order it is layed out in this guide.
  150.  
  151. From here on out you need to make a habit of only downloading your software directly from the manufacturer of the software. Never download anything from IRC,
  152. YouTube, MediaFire, etcetera unless they are just pictures, scripts, documents, audio or video, etcetera and even then be very wary of disguised file extensions.
  153.  
  154. Firstly, you need to find out what CPU architecture your Processor chip is, whether it be 32bit (x86) or 64bit (x64) and write that down with a pen and paper.
  155.  
  156. Secondly, you will be starting on the first step of this guide as explained below this line, you will need Ubuntu-Linux so you can thoroughly wipe your hard disk drive clean
  157. from everything on it using GParted and then you will download the clean and official Microsoft Windows 8 Enterprise RTM ISO directly from Microsoft while still
  158. on the Ubuntu-Linux Live USB ( or DVD if you make one ).
  159.  
  160. So, let's begin!
  161. ---------------------------------------------------------------------------------------
  162.  
  163. Preparing Ubuntu-Linux:
  164. (01): - Download the newest Ubuntu-Linux Operating System from the Official Ubuntu-Linux web site and get the version that works with your CPU architecture.
  165.       ( http://www.ubuntu.com/ )
  166.  
  167. Are you going to use a USB Stick or a DVD Disc?
  168.  
  169. Prepare the USB Stick:
  170.        After this ISO is downloaded, Completely disconnect from the Internet, Open a Command Prompt and Prepare one of your USB Sticks by typing:
  171.       ---------------------------
  172.       Command Prompt> DiskPart
  173.       Command Prompt> list disk
  174.       Command Prompt> select disk # ( where the # symbol is the disk number, look for the USB Stick by Disk Size ( 4GB or greater )
  175.       Command Prompt> clean ( if this command gives you an error keep doing the command until it does not give any error )
  176.       Command Prompt> create partition primary
  177.       Command Prompt> select partition 1
  178.       Command Prompt> format fs=fat32
  179.       After it says complete type:
  180.       Command Prompt> active
  181.       Command Prompt> assign
  182.       ---------------------------
  183.      
  184.      - After this ISO is downloaded completely disconnect from the Internet by disconnecting from whatever means you are connected, WiFi/Hardline/NFC, etcetera.
  185.        Now unpack the Ubuntu-Linux Operating System ISO file, highlight all of the files, right click, click properties and enable the read-only flag and click apply.
  186.        Highlight all of the files again and drag and drop them into the newly prepared USB stick and wait for the files to transfer, after it finishes name the USB Stick: Ubuntu-Linux
  187.  
  188. Prepare the DVD Disc:
  189.      - After this ISO is downloaded completely disconnect from the Internet, Insert a blank DVD Disc into your DVD Burner Drive and burn the Ubuntu-Linux ISO.
  190. ---------------------------------------------------------------------------------------
  191.  
  192. BIOS Configuration:
  193. (02): - You now need to reboot your machine and then enter your BIOS ( Basic Input Output System ) Configuration Menu by rapidly hitting either the F2/F11/F12/DEL key-
  194.     on your keyboard as it boots ups. You will need to know if you are running a LEGACY BIOS or the new ( as of the date this guide was published ) UEFI-
  195.     ( Unified Extensible Firmware Interface ) BIOS with the Secure Boot technologies. If you are running a UEFI BIOS with Secure Boot Technologies you will need-
  196.     to disable them and force the BIOS into LEGACY mode so that you can boot up the Ubuntu-Linux LIVE USB ( or DVD if you burned the ISO ).
  197.     Now change the boot order to boot the USB stick ( or DVD ) first once the BIOS is in LEGACY mode, save your configuration changes and reboot the machine.
  198. ---------------------------------------------------------------------------------------
  199.  
  200. Boot Ubuntu-Linux and Prepare Hard Disk Drive:
  201. (03): - Now Boot the Ubuntu-Linux Live USB ( or DVD if you burned the ISO ) and immediately search for the Partitioning software called GParted.
  202.     Start GParted and and Select hda, Delete all of the Partitions on your Hard Disk Drive, create a new Partition to the NTFS File System, Format and click "Apply All Operations".
  203. ---------------------------------------------------------------------------------------
  204.  
  205. Preparing Microsoft Windows 8 Enterprise RTM Evaluation:
  206. (04): - Download Microsoft Windows 8 Enterprise RTM Evaluation ISO From:
  207.      ( https://technet.microsoft.com/en-us/evalcenter/hh699156.aspx )
  208.       - Download the 32bit version if your CPU is (x86) or the 64bit version if your CPU is (x64).
  209.  
  210. Verify ISO Integrity:
  211.       - Open a Terminal and type: "cd" ( change directory ) to the directory where the Windows 8 Enterprise RTM Evaluation ISO was downloaded to.
  212.        Type the command: "dir" and highlight the file name of the downloaded ISO file, right click and click copy.
  213.        now type sha1sum -t and then right click and click paste, then hit enter.
  214.        Once the Command completes it will print a SHA-1 hash string to your Terminal, highlight that string, right click and click copy.
  215.  
  216.       - Now go to Google Search and search for: "Windows 8 Enterprise Evaluation hash" you will end up finding this page:
  217.      ( http://social.technet.microsoft.com/Forums/windows/en-US/7175dbf7-5a62-4879-bc6b-b2b4c516307d/what-is-the-sha1-hash-for-the-download )
  218.        or
  219.      ( http://social.technet.microsoft.com/Forums/windows/en-US/da325cc1-afaf-45bc-98c8-eb3790f845ed/md5-sha1-for-windows-8-enterprise-enus-evaluation )
  220.        Now press CTRL+F on your keyboard to find a keyword in this page and paste the copied SHA-1 hash you got from doing the file integrity check, if indeed your downloaded-
  221.        Microsoft Windows 8 Enterprise RTM Evaluation ISO is official and clean you will find your SHA-1 hash to be the exact same hash printed on this-
  222.        Official Microsoft TechNet web page.
  223.  
  224.       - So, now you know it's CLEAN and OFFICIAL. This is the RTM version which means it's the complete feature-full version with a 90 days evaluation period, but-
  225.        don't worry about that because later on after you get all the updates for it you will be manually cracking it without the aid of backdoored cracking tools-
  226.       for unlimited time usage.
  227.  
  228.      - Insert a completely different USB Stick or DVD Disc.
  229.       Mount or Unpack the Microsoft Windows 8 Enterprise RTM Evaluation ISO.
  230.        
  231. Are you going to use a USB Stick or a DVD Disc?
  232.  
  233. USB Stick:
  234.     - Open the GParted Software again and select the new USB Stick, Delete all Partitions, Create the Primary Partition, Format to FAT32 File System and click "Apply All Operations".
  235.       Right click the Partition and click "Manage Flags" and enable the "BOOT" flag and click apply.
  236.       With the Microsoft Windows 8 Enterprise RTM Evaluation ISO either Unpacked or Mounted highlight all of the files and transfer them over to the USB Stick.
  237.        
  238. DVD Disc:
  239.     - Open the Brasero Software and burn the Microsoft Windows 8 Enterprise Evaluation ISO to your DVD disc.
  240. ---------------------------------------------------------------------------------------
  241.  
  242. Gather Software and Hardware Drivers:
  243. (05): - Download MalwareBytes Offline Installer + Up-To-Date Malware Database From:
  244.      ( http://www.malwarebytes.org/ )
  245.  
  246.      - Download ClassicShell Start Menu From:
  247.      ( http://classicshell.sourceforge.net/ )
  248.  
  249.      - Download Mozilla FireFox Offline Installer From:
  250.      ( http://www.mozilla.org/en-US/firefox/all/ )
  251.       Trust me you're going to want FireFox and not Chrome or anything else because #1: the security it provides and #2:
  252.        there are very good hacking add-ons that you can download from their add-on repository which is better than Chrome.
  253.        
  254.       - Download Microsoft EMET ( Enhanced Mitigation Experience Toolkit ) From:
  255.       ( http://blogs.technet.com/b/srd/archive/2013/06/17/emet-4-0-now-available-for-download.aspx )
  256.        This Microsoft Research and Defense Software is an excellent toolkit that will keep all of your other software and your Operating System-
  257.        completely safe from all known exploitation code packed into Executables and Software Installers and it also prevents unknown exploit code from
  258.        even running because all executables are passed through this toolkit automatically and it detects if the executable tries to modify any system files
  259.        or if it tries to do any kind of HEAP Spray, Buffer Overflow, Buffer OverRun, Deep Hooks and multiple other exploit techniques which are used by
  260.        0day Exploits ( a 0day is an exploit that is not publicly known ) and it will automatically crash the process. Even though the newest Encrypted RATs cannot-
  261.        be detected by Anti-Virus and Anti-Malware scanners, if such a RAT makes its way onto your system, EMET will automatically crash it and prevent it from-
  262.        even being executed, because the way RAT tools work is by hooking onto other processes or doing other elevated things it should not be doing and EMET will
  263.        detect this and prevent it from even being executed.
  264.  
  265.       - Download PiriForm CCLeaner From:
  266.       ( http://www.piriform.org )
  267.         This is excellent software that stands for Crap Cleaner, it will secure delete all temporary files, unused registry keys and the like.
  268.  
  269.       - Download Console++ From:
  270.       ( http://sourceforge.net/projects/console/ )
  271.         This is a great Terminal-like replacement for the Microsoft Windows Command Processor and you will be using it a lot later on.
  272.  
  273.       - Download KeePass Encrypted Password Database From:
  274.       ( http://www.KeePass.com )
  275.         This great software will generate extremely long and random mixed character alpha,char,numeric passwords and store them in a very organized database for you.
  276.         Use this software to generate random passwords which are different every time for every single Anonymous account that you create.
  277.  
  278.       - Download Secunia PSI From:
  279.       ( http://secunia.com/products/consumer/psi/sys_req/ )
  280.         Secunia PSI will scan your installed applications, gather their version number and then check the Secunia PSI Database for the most recent and up-to-date-
  281.         version and then tell you if you're running the most up-to-date version or not.
  282.  
  283.      - Download Resource Hacker From:
  284.      ( http://www.softpedia.com/get/Programming/File-Editors/Resource-Hacker.shtml )
  285.        Resource Hacker is what you will be using later on to modify the Shell32.dll.mui file to remove the watermarks from Microsoft Windows 8 Enterprise RTM.
  286.  
  287.     - Download all of the Offline Software Installer Packages that you intend on using directly from the Manufacturer/Vendor of the Software now.
  288.  
  289.     - Download Hardware Drivers and BIOS FLASHING Kit:
  290.       Now you need to get the Model Number of your Laptop or Desktop. If your Desktop is custom built then you need to open up the side door of your tower-
  291.       and get the Motherboard model number off the sticker that is on the Motherboard and get the model number of all your other parts and write them all down.
  292.       For most prebuilt and name brand Desktop Computers ( Dell, HP, Asus, etc ) there will be a sticker on the back of the tower or on the front with your model number.
  293.       For most Laptops there is a sticker on the bottom of the Laptop with the full model number.
  294.       After you have that written down you need to go to the manufacturer website and search for the Hardware Drivers/BIOS for your system.
  295.       Download ALL of the Hardware Drivers for your System and put the packages on a completely different USB Stick/Media in a new folder you make and name it: Tools.
  296.  
  297.     - Now you need to FLASH your BIOS from the BIOS menu with the downloaded BIOS flashing kit that you got from your Hardware Manufacturer,
  298.       remember that you are FLASHING your BIOS to eliminate any possibilities of malicious code being placed in your BIOS ROM Chip.
  299.       You may need to do additional research on how to flash your BIOS for your specific hardware,
  300.       but it is CRUCIAL that you flash your BIOS before doing any of the rest of this guide, and it doesn't matter if your BIOS is already-
  301.        the most recent version, you still need to FLASH it regardless because this will remove any malware/rootkit from the BIOS layer and make it new.
  302.  
  303.      - If you cannot FLASH your BIOS from the BIOS interface (F2) and your Hardware Manufacturer made some kind of BIOS FLASHING kit that you run from Windows then-
  304.        you absolutely need to wait to FLASH your BIOS until AFTER you install your new, clean and official Windows 8 Enterprise RTM Evaluation ISO,
  305.        the reason for this is because if your current OS Installation is compromised with a RAT or rootkit/bootkit malware-
  306.        and you FLASH your BIOS from this compromised OS Installation you will end up reinfected immediately.
  307.        If this is the case for you then wait until you wipe and install your new Windows OS to FLASH your BIOS and after you have FLASHED your BIOS you will-
  308.        need to reinstall Windows 8 Enterprise RTM again doing the following steps. Doing it this way will eliminate any possibility of malware making its way into your new system.
  309. ---------------------------------------------------------------------------------------
  310.  
  311. BIOS Configuration:
  312. (06): - With your USB Stick ( or DVD Disc ) prepared with Microsoft Windows 8 Enterprise RTM Evaluation finished you now need to safely eject the USB Stick-
  313.        ( or remove the DVD Disc from the drive ) and reboot.
  314.  
  315.       - Rapidly hit F2/F11/F12/DEL or whichever key it is so that you can re-enter the BIOS Configuration and:
  316.       - Place a Password on both your BIOS and your Hard Drive ( If you have the option ).
  317.       - Enable Fast Boot ( If you have the option ).
  318.       - Enable Secure Boot ( If you have the option ).
  319.       - Install Default Secure Boot Keys ( If you have the option ).
  320.       - Set the first boot option to boot the newly made EFI USB with Microsoft Windows 8 Enterprise RTM Evaluation.
  321.       - Save changes and exit.
  322. --------------------------------------------------------------------------------------
  323.  
  324. Install Microsoft Windows 8 Enterprise RTM Evaluation:
  325. (07): - Boot Microsoft Windows 8 Enterprise RTM Evaluation Setup and:
  326.       - Delete all Partitions.
  327.       - Create the Primary Partition and make it 120 GB ( This one is going to be your Operating System Partition ).
  328.       - Create the Secondary Partition and make it the rest of the left over space ( This one is going to be your Backup Partition for all of your files ).
  329.       - Format each Partition 3 times in a row.
  330.       - Install Microsoft Windows 8 Enterprise RTM Evaluation to the Primary Partition ( 120 GB ).
  331. --------------------------------------------------------------------------------------
  332.  
  333. Initial Setup of Microsoft Windows 8 Enterprise RTM Evaluation:
  334. (08): - In the Installation steps name your Primary Administrator user account "Super" or "SuperUser" and give it a password.
  335.       - In the Installation steps be sure to turn off any options here that would invade your privacy, but keep the Smart Screen filter on.
  336.  
  337. After you have installed Microsoft Windows 8 Enterprise RTM you need to open up the TOOLS folder with all the application installers you downloaded and:
  338.       - FLASH your BIOS ( if you couldn't do it from Ubuntu-Linux or the BIOS Configuration, do it now ) and reboot.
  339.      ( Also, if you had to FLASH your BIOS at this point you will have to boot up Ubuntu-Linux again, wipe your hard drive again and then install Windows again ).
  340.      - Install Dot NET 4.0 and 4.5 by opening a Command Prompt as Administrator ( Windows Key + X ) and type this Command:
  341.      Command Prompt> DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /LimitAccess /Source:d:\sources\sxs
  342.      ^^^ Replace the d:\ with whatever drive letter your Microsoft Windows 8 Enterprise RTM Evaluation USB Stick or DVD Disc is assigned.
  343.      - Install Microsoft EMET and turn everything to "Always On" and reboot if necessary.
  344.      - Install Secunia PSI.
  345.      - Install ClassicShell for your Start Menu ( which bypasses the MetroUI and gives you an attractive Start Menu ).
  346.      - Install Mozilla FireFox.
  347.      - Install Malwarebytes.
  348.      - In order for you to verify the integrity of all system files and ensure that you're 100% clean at this point is to run the command:
  349.       Command Prompt> SFC /SCANNOW
  350.       ^^^ You should get a response back after it scans stating: "File Integrity Check completed and no errors were found".
  351.       - Connect to the Internet.
  352.       - Open Windows Update and do a full update, don't do any other activities until Windows Update finishes and reboot when necessary.
  353.      - After you have updated Windows using Windows Update check again for any other updates using Windows Update until you get everything updated and installed-
  354.        and there are no more updates to get.
  355.      - Install your Hardware Drivers.
  356.      - Update DirectX by Downloading and Running this Package:
  357.      ( http://www.microsoft.com/en-us/download/details.aspx?id=35 )
  358.      - Reboot
  359. ---------------------------------------------------------------------------------------
  360.  
  361. Congratulations, you now have a 100% Clean and Official Microsoft Windows 8 Enterprise RTM ( Release To Manufacturer ) Operating System Installed.
  362.  
  363. * DO NOT PUT ANY OTHER FILES ON THIS HARD DRIVE YET
  364. * DO NOT ATTACH ANY OTHER USB DRIVES, DVDs, CDs OR ANY OTHER MEDIA AT ALL WHATSOEVER UNTIL YOU HAVE FINISHED COMPLETING THE NEXT GUIDE.
  365.  
  366. ** Immediately head to the next guide and start Configuring your Operating System to Harden its Security **
  367.  
  368. This Tutorial: ( Paste:  )
  369. This Tutorial: ( Video:  )
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement