Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.

Slides:



Advertisements
Similar presentations
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning.
Advertisements

System Security Scanning and Discovery Chapter 14.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
System and Network Security Practices COEN 351 E-Commerce Security.
Vulnerability Analysis Borrowed from the CLICS group.
Chapter 7 HARDENING SERVERS.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
CMSC 691X – Summer 2002 Project By Pravin D’Souza.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 SAMBA. 2 Module - SAMBA ♦ Overview The presence of diverse machines in the network environment is natural. So their interoperability is critical. This.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Hands-On Microsoft Windows Server 2008
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities.
Chapter 8 Desktop and Server OS Vulnerabilities. Objectives  After reading this chapter and completing the exercises, you will be able to:  Describe.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Hands-On Ethical Hacking and Network Defense Chapter 8 Microsoft Operating System Vulnerabilities.
Hands-On Ethical Hacking and Network Defense
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
SAMBA Integrating Linux and Window. What is Samba? Free suite of programs that enables flavors of UNIX to work with other operating systems such as OS/2.
Honeypot and Intrusion Detection System
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Retina Network Security Scanner
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
NetTech Solutions Protecting the Computer Lesson 10.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Last updated
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Last modified
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Chapter 8 Desktop and Server OS Vulnerabilities. Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
CITA 352 Chapter 6 Enumeration.
Installing TMG & Choosing a Client Type
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 6 Application Hardening
Module 8: Networking Services
Secure Software Confidentiality Integrity Data Security Authentication
LINUX ADMINISTRATION 1
Introduction to SQL Server 2000 Security
Firewalls.
Chapter 3: Windows7 Part 4.
Nessus Vulnerability Scanning
Information Security Session October 24, 2005
Hands-On Ethical Hacking and Network Defense
Desktop and Server OS Vulnerabilities
Lesson 16-Windows NT Security Issues
Windows Firewall Adem Enes POLAT
Windows Name Resolution
Designing IIS Security (IIS – Internet Information Service)
Hacking Windows Damian Gordon.
Presentation transcript:

Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia

Objectives  Describe the tools available to assess Microsoft system vulnerabilities  Describe the vulnerabilities of Microsoft operating systems  Describe the vulnerabilities of services running on Microsoft operating systems  Explain techniques to harden Microsoft systems against common vulnerabilities  Describe best practices for securing Microsoft systems 2

Microsoft tools  The OS developer tools may be the most effective for assessing vulnerabilities  They have interest in providing tools that improve their system’s security  Microsoft offer the following vulnerability assessment and fixing tools:  Microsoft Baseline Security Analyzer (MBSA)  Winfingerprint  HFNetChk 3

MBSA  Effective tool that checks for  Patches for major Microsoft products  Security updates for major Microsoft products  Configuration errors  Blank or weak passwords  Others  MBSA supports remote scanning  Associated product must be installed on scanned computer 4

Using MBSA  System must meet minimum requirements before installing MBSA on a computer  After installing, MBSA can  Scan itself  Scan other computers remotely  Be scanned remotely 7

8

HFNetChk  HFNetChk is part of MBSA  Available separately from Shavlik Technologies  Versions  Advanced command line  GUI  Scanning types  MBSA-style scan  HFNetChk-style scan  You must be an administrator on the scanned machine to run the scan 9

Winfingerprint  Administrative tool  It can be used to scan network resources  Exploits Windows null sessions  Detects  NetBIOS shares  Disk information and services  Null sessions 10

Winfingerprint (continued)  Its capabilities also include  ICMP and DNS resolution  OS detection  Service packs and hotfixes  Running modes  Passive  Interactive  Can be run on a single machine or the entire network  You can also specify IP addresses or ranges 11

12

13

14  Microsoft integrates many of its products into a single packet  Good software engineering practice  Creates a single point of failure  Security testers should search for vulnerabilities on  The OS they are testing  Any application running on the target computer  Good information sources  Common Vulnerabilities and Exposures (CVE) site  Vendor Web site Microsoft OS Vulnerabilities

15

Remote Procedure Call (RPC)  RPC is an interprocess communication mechanism  Allows a program running on one host to run code on a remote host  Examples of worms that exploited RPC  MSBlast (LovSAN, Blaster)  Nachi  Use MBSA to detect if a computer is vulnerable to an RPC-related issue 16

Server Message Block (SMB)  Used by Windows 95, 98 and NT to share files  Usually runs on top of NetBIOS, NetBEUI or TCP/IP  Hacking tools  L0phtcrack’s SMB Packet Capture utility  SMBRelay 17

Closing SMB Ports  Best way to protect a network from SMB attacks  Routers and firewall should filter out ports  137 to 139 

19 Common Internet File System (CIFS)  CIFS replaced SMB for Windows 2000, XP, and Windows 2003 Server  SMB is still used for backward compatibility  Remote file system protocol  Enables computers to share network resources over the Internet  Relies on other protocols to handle service announcements

Understanding Samba  Open-source implementation of CIFS  Created in 1992  Samba allows sharing resources over multiple OSs  Samba accessing Microsoft shares can make a network susceptible to attack  Samba is used to “trick” Microsoft services into believing the *NIX resources are Microsoft resources 20

Understanding Samba (continued)  Enable sharing resources  Configure the Smb.conf file to include any shared files or printers  Run the Testparm to identify any syntax error in the Smb.conf file  User is prompted for a user name and password  Other files and commands  Smbpasswd file  Smbuser command 21

Vulnerabilities in Microsoft Services 22  Internet Information Services (IIS)  SQL Server

Web Services  IIS 6.0 installs with a “secure by default” posture  Previous versions left crucial security holes  Configure only services that are needed  Windows 2000 ships with IIS installed by default  Running MBSA can detect IIS running on your network 23

SQL Server  SQL vulnerabilities exploits areas  The SA* account with a blank password  SQL Server Agent  Buffer overflow  Default SQL port 1433  Vulnerabilities related to SQL Server 7.0 and SQL Server * Server Administrator

The SA Account  SQL Server 6.5 and 7 installations do not require setting a password for this account  SQL Server 2000 supports mixed-mode authentication  SA account is created with a blank password  SA account cannot be disabled 25

SQL Server Agent  Service mainly responsible for  Replication  Running scheduled jobs  Restarting the SQL service  Authorized but unprivileged user can create scheduled jobs to be run by the agent 26

Default SQL Port 1443  SQL Server is a Winsock application  Communicates over TCP/IP using port 1443  Spida worm  Scans for systems listening on TCP port 1443  Once connected, attempts to use the xp_cmdshell  Enables and sets a password for the Guest account  Changing default port is not an easy task 27