Hacking Exposed 7 Network Security Secrets & Solutions Chapter 4 Hacking Windows 1.

Slides:



Advertisements
Similar presentations
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Chapter 13 Securing Windows Server 2008
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 7 HARDENING SERVERS.
COEN 252: Computer Forensics Router Investigation.
Hacking Web Server Defiana Arnaldy, M.Si
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Hands-On Ethical Hacking and Network Defense Chapter 8 Microsoft Operating System Vulnerabilities.
Chapter 4 System Hacking: Password Cracking, Escalating Privileges, & Hiding Files.
Chapter 4 Hacking Windows Last modified: Reasons for Windows Security Problems Popularity & Complexity Backward Compatibility –Very important.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter Six Windows XP Security and Access Controls.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Chapter 4 Hacking Windows Last modified: Reasons for Windows Security Problems Popularity & Complexity Backward Compatibility –Very important.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Chapter 4 Hacking Windows Part 2. Authenticated Attacks Privilege Escalation Pilfering –Grabbing the Password Hashes –Cracking Passwords –LSADump –Previous.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 7: Implementing Security Using Group Policy.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Security Data Transmission and Authentication Lesson 9.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Hacking Windows.
Working at a Small-to-Medium Business or ISP – Chapter 8
Configuring Windows Firewall with Advanced Security
– Chapter 3 – Device Security (B)
– Chapter 3 – Device Security (B)
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Hacking Exposed 7 Network Security Secrets & Solutions Chapter 4 Hacking Windows 1

Hacking Windows Unauthenticated attacks Authenticated attacks Windows security features 2

Prelude Vulnerabilities – Trivially exploited configuration vulnerabilities NetBIOS null sessions, simple IIS buffer overflow – More complex ones Heap exploits, end user attack through Internet Explorer Areas of focus – Network services, kernel drivers, applications Factors of risk: popularity and complexity – Popular Windows vulnerabilities: Code Red, Nimda, Slammer, Blaster, Netsky, Gimmiv, etc. – NT 3.51  Windows 7: tenfold in code size New security-related features – Reduced default network services, host firewall enabled by default, user account control (UAC), etc. 3

Unauthenticated Attacks Authenticated Spoofing Remote password guessing – Main targets: Server Message Block (SMB) on TCP 445 and 139, Microsoft Remote Procedure Call (MSRPC) on TCP 135, Terminal Services (TS) on TCP 3389, SQL on TCP 1433 and UDP 1434, SharePoint (SP) over HTTP on TCP 80 and HTTPS on TCP 443, etc. – Automatic guessing on CLI: FOR and net use with username/password file (see virus/org/default- password), enum, Brutus, THC Hydra, Venom – Automatic guessing on GUI of Terminal Services/Remote Desktop Services: TSGrinder, Rdesktop after patch with brute-force capabilities 4

Unauthenticated Attacks Password-Guessing Countermeasures Network firewall to restrict access to potentially vulnerable services/ports Host “Windows Firewall” Disable unnecessary services Enforce strong password policy Set an account-lockout threshold Log and analyze account logon failures – Dumpel, DumpEvt, Event Comb, ELM Log Manager 5

Unauthenticated Attacks Eavesdropping on Network Password Exchange Three authentication protocols: LM (LAN Manager) (with hash), NTLM (with RC4 encryption), Kerberos (with private or optional public key encryption) Attack tools: Cain, LCP, L0phtcrack, KerbSniff – Sniffing, brute-force cracking, dictionary cracking, Rainbow cracking (from a valid account) – To sniff on a switched network: ARP spoofing/poisoning to redirect traffic through attackers 6

Unauthenticated Attacks Windows Authentication Sniffing Countermeasures Disable LM authentication Pick good passwords (password complexity features) No dictionary password Use public key encryption Use built-in Windows IPsec to authenticate and encrypt traffic 7

Unauthenticated Attacks Man-in-the-Middle Attacks (MITM) Relay legitimate client authentication exchange and gain access to the server as the client SMBRelay: Harvest usernames and password hashes from SMB traffic and import into cracking tools ARP spoofing and DNS redirection: force victims to connect and authenticate to malicious SMB servers Tools: Cain, Squirtle, SMBRelay3 – Cain: redirect local traffic to itself with ARP spoofing, then downgrade clients to easier authentication dialects (sniffed, unencrypted, recorded) MITM countermeasures – Authenticate and encrypt connections between clients and servers IPsec in Windows Firewall – Disable NetBIOS Name Services 8

Unauthenticated Attacks Pass-the-Hash Use LM and/or NTLM hash of a user’s password – No need to crack/brute-force the hash to cleartext password – Replay to gain to gain authorized access – Limitations: Not all functionalities of the protocol are implemented – Dump/modify NTLM credentials stored in memory and replay Windows Credentials Editor (WCE) Pass the ticket for Kerberos – WCE: dump Windows Kerberos tickets and reuse them 9

Unauthenticated Attacks Remote Unauthenticated Exploits Flaws or misconfigurations in Windows software itself – TCP/UDP services  driver interface, user-mode applications (MS Office, Internet Explorer, Adobe Acrobat Reader) Metaexploit – Framework plus archive of exploit modules – Locate/search the exploit module – Customize exploit parameters (vendor and model of victim software), payloads (remote command shell, users, injecting prebuilt code), and options (target IP address, IDS evasion, etc.) Network service exploit countermeasures – Patch, available workaround, log and respond 10

Unauthenticated Attacks End-User Application Exploits End users – Less professional on security – Poorly managed rich software ecosystem Adobe Flash Player in browser – Display of rich media and animated content over Internet – Metaexploit (search /w adobe flash) Countermeasures – Personal firewall, network firewall, patch, antivirus, Internet options in control panel, least privilege, read in plaintext, configure to very high macro security, don’t be gullible, secure devices physically 11

Unauthenticated Attacks Device Driver Exploits Windows wireless: within physical proximity to a rogue access point beaconing malicious packets Plug and play (compatibility) – Vast sea of drivers Execution in highly privileged kernel mode  total compromise Metaexploit exploit modules: e.g. oversized wireless beacon frame  remote code execution Countermeasures – Patch, turn-off at high concentration of APs, driver signing (trusted signatures on kernel-mode software), User-Mode Driver Framework (UMDF) 12

Authenticated Attacks Privilege escalation Privilege escalation – From a user account to admin/system privilege Getadmin family of exploits – DLL injection – Interactively logged-on accounts from escalating privileges – From Administrator to SYSTEM privilege at (Windows Scheduler service) or psexec (remotely) Preventing privilege escalation – Patch your Windows – Restrict interactive logon privileges Run Security Policy applet  Local Policies  User Right Assignment  Deny log on locally 13

Authenticated Attacks Extracting Passwords Extracting and cracking passwords – From administrator, post-exploit activities: Gather more usernames and passwords Disable Windows firewall Grabbing password hashes – Stored in Windows Security Accounts Manager (SAM) for local users, Active Directory on Windows 2000 and domain controllers (DCs) for domain accounts – pwdump/pwdump2-6, fgdump, and automated remote hash extraction (LSA cache dumping, protected store enumeration) use DLL injection to insert themselves into a privileged running process to extract password hashes – pwdump countermeasures: no defense if /w admin and DLL injection 14

Authenticated Attacks Cracking passwords Hashing – one-way encipherment Offline password guessing – Hashing algorithm  hash for a list of possible values (e.g. dictionary)  compare with hashed password from pwdump  matched means cracked – Account lockout is not an issue Weak hash algorithm – Stronger hashing vs. salting (random value to prevent precomputed hash tables, rainbow tables, that speedup cracking) Smart guessing – Dictionary, brute-force, precomputed hash tables – Project Rainbow Crack: precomputed LM hash table for $120 with 24GB in 6 DVDs Tools – CLI: John The Ripper Jumbo – GUI: LCP, Cain (dictionary, brute-force, LM/NTLM hashes, sniffed, rainbow tables), Ophcrack, L0phtcrack, Elcomsoft Processing time – Entropy ~ unpredictability 15

Authenticated Attacks Dumping Cached Passwords Dumping cached passwords – Local Security Authority (LSA) Secrets cache Service account passwords in plaintext, cached password hashes of the last ten logon users, FTP/Web user plaintext passwords, remote access services (RAS) dial-up accounts and passwords, etc. LSADump2 (~pwdump2 with DLL injection): finds PID of LSASS, injects itself, grabs LSA Secrets Cain (with built-in LSA Secrets extractor), gsecdump CacheDump, MS-Cache Hashes, WCE Password cache dumping countermeasures – LSA hotfix /w encryption: but circumvented by lsadump2 by DLL injection – Avoid getting admin-ed in the first place – Change the Registry value 16

Authenticated Attacks Dumping Hashes Stored in Memory Dumping hashes stored in memory – Windows Credentials Editor (WCE) – In memory: usernames, domain names, password hashes of users logon interactively, locally or remotely Cached credentials Dumping hashes stored in memory countermeasures – No silver bullet – Keep the security of ALL members Compromised server  compromised domain – Avoid RDP to unknown systems – Avoid granting admin privileges 17

Authenticated Attacks Remote Control and Back Doors Back doors: services enabling remote control Command-line remote control tools – netcat/nc (TCP/IP Swiss army knife) Configured to listen on a port and launch an executable when connected – psexec (SMB on TCP 139 or 445) and at – Metaexploit Framework: a large array of backdoor payloads to spawn command-line shells bound to listening ports, etc. Graphical remote control tools – Terminal Services on TCP 3389 – Virtual Network Control (VNC) 18

Authenticated Attacks Port Redirection Fpipe – A TCP source port forwarder/redirector – A compromised system running a telnet server behind a firewall that blocks port 23 (telnet) but allow port 53 (DNS) Fpipe started with a listening server port 53 and redirected to port 23 Stream forced by Fpipe to use source port 53 to pass the firewall 19

Authenticated Attacks Covering Tracks Disabling auditing – auditpol Clearing event log – elsave Hiding files – attrib – Alternate Data Streams (ADS) Rootkits – Post-exploit kits after gaining the root privilege 20

General Countermeasures to Authenticated Compromise Filenames – Look for suspicious or hidden file names – Use antimalware software Registry keys – Look for rogue registry keys (most applications look for specific values in specific locations) – reg delete to remove them Processes – Malicious process with CPU utilization – kill to stop – Check scheduler queue: at, schtasks, task scheduler Ports – Identify renamed netcat listener (back door): netstat -an 21

Windows Security Features (1/3) Windows Firewall – “Exception” metaphor for permitted applications – All inbound connections are blocked by default Automated Updates Security Center – For consumers, not IT pros Security Policy and Group Policy – For stand-alone computer and large number of systems Microsoft Security Essentials – Antimalware: real-time protection, system scanning and cleaning, rootkit protection, network inspection, automatic updates The Enhanced Mitigation Experience Toolkit – Managing mitigation technologies in Windows: DEP (Data Execution Prevention), ASLR (Address Space Layout Randomization) 22

Windows Security Features (2/3) Bitlocker and encryption file system – EFS (Encryption File System) Symmetric key itself encrypted by public key of a user and stored as an attribute of the file; symmetric key decrypted by a private key first before decrypting the file – BDE (Bitlock Drive Encryption) Encrypt the entire volumes and store the key securely Cold boot attack: cool DRAM chips to increase the time before the key is flushed from volatile memory Countermeasures: separate the key physically, removable external module Windows Resource Protection (WRP) – Protect files and registry values from modifications by ACL Integrity levels – Mandatory Integrity Control (MIC): actions - privileges 23

Windows Security Features (3/3) Data Execution Protection (DEP) – Mark portions of memory nonexecutable to prevent buffer overflow attacks Windows service hardening – Service resource isolation, least privilege services, service refactoring, restricted network access, session 0 isolation Compiler-based enhancements – Compile-time under-the-hood features, not configurable by admins or users: buffer security check (GS), ASLR, SafeSEH 24

Summary 1.Center for Internet Security (CIS): free Microsoft security configuration benchmarks and scoring tools at 2.Another book – Hacking Exposed Windows 3.New Microsoft security tools and best practices at microsoft.com/security 4.Don’t forget exposures from other Microsoft products, e.g. SQL vulnerabilities 5.Applications are far more vulnerable than OS Hacking Exposed Web Applications 6.Minimization equals higher security 7.Disable file, print, and other unnecessary services 8.Use Windows Firewall 9.Protect Internet-facing servers 10.Keep up to date service packs and security patches 11.Limit interactive logon privileges and escalation 12.Use Group Policy to create and distribute configurations 13.Enforce physical security against offline attacks 14.Subscribe to security publications and online resources 25