So You Think Your Domain Controller Is Secure?

Slides:



Advertisements
Similar presentations
Novi VMM... što je ustvari novo? Tomica Kaniški CITUS d.o.o.
Advertisements

1.System Center Review 2.SCOM Review 3.SC 2012 R2 OM 1.Components 2.Architecture 3.Concepts 4.Features 5.Console Demo 6.Tools and Links 6. Q & A.
Managing vSphere and Hyper-V with SCOM 2012 June 2012 Brien Posey – Microsoft MVP.
Windows Deployment Services Sysprep and You
Intro to SharePoint 2013 Architecture Liam Cleary.
ActiveXperts Network Monitor Monitors servers, workstations and devices for availability Alerts and corrects.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Computer Security: Principles and Practice
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
6 Hypervisor Management OS Guest VM 1 Guest VM n Hardware User Mode Kernel Mode User Mode … Kernel Mode User Mode.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
System Center 2012 R2 Windows Azure Pack Service Management Automation 101.
1 Management Pain points now Existing tools: Do not map to virtual environments Provisioning Backup Health monitoring Performance monitoring / management.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
IM-B201 Traditional Virtualized Private Cloud Public Cloud  Windows  Linux  UNIX  Windows  Linux  UNIX  Windows  Linux  Windows  Linux.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Hands-On Microsoft Windows Server 2008
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Chapter 12 Operating System Security Strategies The 2010 Australian Signals Directorate (ASD) lists the “Top 35 Mitigation Strategies” Over 85% of.
Module 4 : Installation Jong S. Bok
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Michael Faden Technology Solution Professional - Datacenter 2012 R2.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Cross-platform from the metal up Offer robust Linux/UNIX capabilities across WSSC & Azure products.
Chapter 2 Securing Network Server and User Workstations.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
SCSC 455 Computer Security Chapter 3 User Security.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Module 7: Designing Security for Accounts and Services.
BÄTTRE UTBILDNINGSRESULTAT. NÅ HÖGRE MED KUNSKAP.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Chapter 12 Operating System Security. Possible for a system to be compromised during the installation process before it can install the latest patches.
Let's build a VMM service template from A to Z in one hour Damien Caro Technical Evangelist Microsoft Central & Eastern Europe
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Stop Those Prying Eyes Getting to Your Data
Consulting Services JobScheduler Architecture Decision Template
Module Overview Installing and Configuring a Network Policy Server
Consulting Services JobScheduler Architecture Decision Template
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Common Security Mistakes
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
(Authentication / Authorization)
Service Template Creation from the Ground Up
Service Template Creation from the Ground Up
Test 3 review FTP & Cybersecurity
Day 2, Session 2 Connecting System Center to the Public Cloud
SharePoint Server Assessment Results
6. Application Software Security
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Objectives. Objectives Objectives Content Configure Microsoft Azure monitor.
Privileged Access Management
06 | SQL Server and the Cloud
Presentation transcript:

So You Think Your Domain Controller Is Secure? Justin Hendricks Security Engineer Twitter - @Script_happens

Introduction Presentation covers basic domain controller isolation principles. Recommendations for securely configuring software used to manage domain controllers (SCOM, HP iLO, and Hyper-V). No vulnerabilities are discussed. Only demonstrations on how features could be abused if not configured properly.

Background Domain Controllers Handle authentication of domain accounts in Windows. Stores password hashes for all domain accounts. The crown jewels of the domain. Recommendations for securing domains focus on pass-the- hash and account segmentation Software used to manage DCs is often overlooked.

Background System Center Operations Manager (SCOM) Software used to monitor server health. Great SCOM security guide available: http://technet.microsoft.com/library/bb821997.aspx Out-Of-Band Management Devices Used to monitor and manage servers over the network regardless of the server state. Guidance on securing OOB devices: http://www.sans.org/reading_room/whitepapers/networkdevs/securing- out-of-band-device-management_906

Background Hyper-V Windows Server Virtualization Software Running domain controllers in Hyper-V: http://technet.microsoft.com/en- us/library/virtual_active_directory_domain_controller_virtualization_hy perv(v=ws.10).aspx “The host computer on which virtual domain controllers are running must be managed as carefully as a writeable domain controller…”

Monitoring Software System Center Operations Manager (SCOM) is used for monitoring and alerting of server health. SCOM management server hosts the SCOM SDK service on port 5723 and 5724. Required to be open in order to pull data across environment boundaries. Firewalls often configured to allow these ports. Default NMap scan does not check these ports. SCOM agent which runs on monitored servers typically runs as SYSTEM.

Abusing Functionality SCOM “tasks” allow you to run VBScript on monitored servers. Any account in the SCOM ‘Administrators’ or ‘Authors’ roles can run VBScript on any monitored server. Code runs under the SCOM agent which is configured to run as SYSTEM by default. SCOM servers that monitor domain controllers should be treated as domain controllers.

SCOM SDK Architecture

Default SCOM Agent Credentials

Security Warnings Many existing articles warn users of the dangers of running tasks under high-privileged accounts: http://www.code4ward.net/main/Blog/tabid/70/EntryId/83/Invoke-External-Programs-and-Scripts-in-SCOM-Tasks.aspx “In this example we will create very generic agent task. You can use this task to execute any command on any windows computer. Be careful with the distribution of this task as it is very dangerous but also very powerful!“ http://technet.microsoft.com/en-us/library/bb735423.aspx “The default account for the Run As profile is the action account. Give appropriate thought to what the action account should be and choose an account with appropriate permissions. In most instances, a domain administrator would not be a good choice.” http://blogs.technet.com/b/kevinholman/archive/2012/02/17/security-in-operations-manager-some-perspectives-and- typical-customer-scenarios.aspx “In this way – you should take care of what tasks to allow operators to be able to run – the default behavior is possible elevation of their privileges… to be able to execute a task running under a pre-defined credential such as local system, or a SQL run-As account.”

Demo Creating SCOM tasks to run arbitrary code.

Recommendations Segregate SCOM servers used to monitor domain controllers. Close off SCOM SDK ports (5723 and 5724). Reduce SCOM ‘Administrators’ and ‘Authors’ roles to only domain admins. Move support and engineers to ‘Read-Only’ or ‘Operator’ SCOM roles. Reduce SCOM agent privileges. Follow the official SCOM security guide: http://technet.microsoft.com/library/bb821997.aspx

Detection and Evasion SCOM tasks should be audited to detect hidden malicious tasks. SCOM stores task execution logs in the SCOM database. Default retention is 7 days, but can be changed. SCOM SDK connections logged in “Operations Manager” event log.

SCOM Task History

Out-Of-Band Management Devices Servers usually have OOB management hardware used for server monitoring and maintenance. HP Integrated Lights Out (iLO), Dell DRAC, IBM Integrated Management Module (IMM), etc Equivalent to physical access to a server. Admin interface accessed over HTTP/HTTPS, SSH, IPMI. Commonly have default passwords set. Remote Root Vulnerabilities: https://community.rapid7.com/community/metasploit /blog/2013/06/23/a-penetration-testers-guide-to- ipmi Difficult to patch.

HP ILO Security Override Switch

OOB Device Default Passwords Default Username Default Password Dell Remote Access Card (DRAC) root Calvin IBM Integrated Management Module (IMM) USERID PASSW0RD HP Integrated Lights Out (iLO) Administrator <Random 8 char string> Fujitsu Integrated Remote Management Controller admin Supermicro IPMI (2.0) ADMIN Oracle/Sun Integrated Lights Out Manager (ILOM) Changeme ASUS iKVM BMC

Demo Using HP iLO to mount Linux live disc.

Recommendations Change default passwords. Have regular patching process for OOB devices. Monitor audit logs for unauthorized access. Configure 2FA when possible Set up separate management VLAN for OOB devices. SANS paper on securing OOB devices: http://www.sans.org/reading_room/whitepapers/networkdevs/ securing-out-of-band-device-management_906

Hyper-V Windows virtualization software that hosts virtual machines. Administrator on the host is equivalent to admin rights on all guest virtual machines. Can boot into a Linux live disc or steal the VHD file to compromise domain controller VM.

Booting Into Linux Live Disc

Stealing NTDS.DIT and SYSTEM hive

Recommendations Segregate Hyper-V servers that host domain controllers. Only domain admins should have access to: Hyper-V servers hosting domain controllers. Domain controller VHDs. Host should be in a separate management network when possible. Additional guidance: http://technet.microsoft.com/en- us/library/virtual_active_directory_domain_controller_virtualiza tion_hyperv(v=ws.10).aspx

Vulnerability Scanners Organizations typically perform authenticated vulnerability scanning. The account used is typically very high privileged and has admin access to domain controllers. These servers should be treated as a domain controller if they use domain admin credentials.

Conclusion Management software and hardware is often highly privileged and can be abused if not properly secured. Segregate management of domain controllers from other categories of servers.

Contact Info Twitter - @Script_Happens Presentation Content will be posted on: https://scripthappens.azurewebsites.net/