Windows Assessment Vulnerability Assessment Course.

Slides:



Advertisements
Similar presentations
Auditing Microsoft Active Directory
Advertisements

COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
Module 4: Implementing User, Group, and Computer Accounts
Chapter 7 HARDENING SERVERS.
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
Introduction to Active Directory
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Chapter 13 Chapter 13: Managing Internet and Network Interoperability.
Hands-On Microsoft Windows Server 2003 Administration Chapter 1 Windows Server 2003 Network Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
By Karan Oberoi.  A directory service (DS) is a software application- or a set of applications - that stores and organizes information about a computer.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Lesson 17. Domains and Active Directory. Objectives At the end of this Presentation, you will be able to:
BZUPAGES.COM An Introduction to. BZUPAGES.COM Introduction Large corporations today face the following problems Finding a certain file. Seeing everything.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
INTRODUCING MICROSOFT WINDOWS SERVER 2003
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
Review. 2 Main Areas Client and Server / Active Directory.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Hands-On Ethical Hacking and Network Defense
Hands-On Microsoft Windows Server 2008
Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at
Module 14: Configuring Server Security Compliance
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Hosted by 10 Best Practices for Windows Security How many of them are you doing? Roberta Bragg HCWT.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
1 Windows 2008 Configuring Server Roles and Services.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Windows Server 2003 La migrazione da Windows NT 4.0 a Windows Server 2003 Relatore: MCSE - MCT.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Module 7: Implementing Security Using Group Policy.
OVERVIEW OF ACTIVE DIRECTORY
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Introduction to Active Directory
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 8 Implementing Security Using Group Policy.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
LM/NTLMv1 Retirement Hosted by LSP Services.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Samba
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Essential Services Lesson 5. Objectives Naming Resolution In today’s networks, you assign logical addresses, such as with IP addressing. Unfortunately,
Secure Connected Infrastructure
Enumeration.
Essential Services Module 5.
ACTIVE DIRECTORY ADMINISTRATION
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Active Directory Stored collection of information about objects
Presentation transcript:

Windows Assessment Vulnerability Assessment Course

2 All materials are licensed under a Creative Commons “Share Alike” license. ■

3 Agenda ■Windows Security Overview ■Active Directory ■Computers and Their Role in the Network ■Built-in tools ■Exercise ■Sources of secure configuration information ■Analysis Tools ■Secure Host Configuration ■Other Sources of Vulnerabilities 3

4 Windows Security Overview ■Local Security Authority (LSA) ■Security Account Manager (SAM) ■Security Reference Monitor (SRM) 4

5 SAM and Active Directory ■On Windows 2K, 2K3, and 2K8 Domain Controllers the user account and hashes are stored in Active Directory –Uses Kerberos for authentication ■In Windows NT/2K-2K8/XP/Vista/Windows 7 non-domain hosts all user names and hashes are kept in the SAM –Early versions of Windows (pre-NT) have LAN Manager (NLM) Hash weaknesses that make password retrieval trivial –Legacy protocol support for backward compatibility in later versions of Windows –New Technology (NT) LM Hash version 2 in NT 4 Service Pack 4 –NTLM does not support any federal compliant cryptographic methods (AES or SHA-256) –NTLM still widely used for non-AD networks –As of Windows Vista, the protocol is disabled by default 5

6 Security Identifiers (SIDs) ■Used to identify a security principal or security group ■Known SIDs are generic groups or users ■Known Relative Identifiers (RIDs) –500Administrator –501 Guest –1000 First User Created 6 S RID SID

7 Active Directory Structure Forest Objects Domain Tree Domain OU Forest Contains domains. Used to define the scope of authority for administrators. Domain Contains OUs. Used to partition the directory data structure and control replication. Organizational Unit (OU) Contains users, computer accounts, and resources. Used to delegate control and apply policies. 7

8 Key Active Directory Attributes ■Trusts between domains –NT –Active Directory ■Domain Name Service (DNS) ■Security group nesting strategies – AGDLP ■Local versus Group Policy 8

9 ■More secure settings by default ■Improved User Account Control (UAC) ■Managed service accounts –Provides service isolation at the cost of ease of administration ■Stronger NTLM authentication ■Windows 2008 enhanced audit –10 versus 9 audit categories –55 granular audit settings ■Improved host-based firewall implementation Security Features of Windows 2008 R2 and Windows 7 9

10 Methodology ■Phase 1 – Planning ■Phase 2 – Information Collection ■Phase 3 – Enumeration ■Phase 4 – Testing and Evaluation ■Phase 5 – Reporting 10

11 Computers and Their Roles ■Find what hosts are connected to the network and their purpose in the environment ■Examples –Domain Name Service (DNS) –Dynamic Host Control Protocol (DHCP) –Windows Internet Name Service (WINS) –Lightweight Directory Access Protocol (LDAP) –Domain Controllers –Internet Information Services (IIS) –Exchange –File and Print Services –Others (Certificate, SQL, SharePoint) ■Many tools needed for this are already included in your system (i.e., ‘net’ command) 11

12 What hosts are in the domain? ■Find what domains are available on the network –net view /domain ■List computers in a domain –net view /domain:DOMAIN-NAME ■You can get the same information from the Windows Explorer but… 12

13 What other hosts do I know about? ■Find out which other computers and networks a computer knows about –nbtstat –a Computer-Name –nbtstat –A IP-Address ■Found on every Windows based computer ■The biggest drawbacks to nbtstat is that it operates on a single computer at a time 13

14 NLTEST ■A command-line utility included in the NT resource kit ■Used to test trust relationships and the state of domain controller replication –nltest /dclist:DOMAIN –nltest /whowill:DOMAIN USER –nltest /finduser:USER –nltest /server:SERVER /trusted_domains 14

15 NBTSCAN ■A command-line tool that scans for open NETBIOS nameservers on a network ■Based on functionality of standard Windows tool nbtstat, but operates on a range of addresses instead of just one –nbtscan /24 – scan all class C network –nbtscan –v – scan all addresses from and displays verbose output 15

16 Exercise ■Identify all Windows hosts in the LAB –Hint: NET VIEW ? 16

17 Methodology ■Phase 1 – Planning ■Phase 2 – Information Collection ■Phase 3 – Enumeration ■Phase 4 – Testing and Evaluation ■Phase 5 – Reporting 17

18 Sources of Secure Configuration Policy ■System Owner Policy ■Center for Internet Security Configuration Guides ( ■NSA’s Configuration Guides ( ■MS Security Central ( ■MS Security Bulletin Search ( ■BugTraq ( 18

19 Useful Analysis Tools ■Utilities –WinGrep ■ –GNU Grep for Windows ■ –WinDiff Utility ■ XP CD-ROM in the Support\Tools folder ■ 9A-E08A-49A2-9D3A-C E85A&displaylang=en 9A-E08A-49A2-9D3A-C E85A&displaylang=en –GNU DiffUtils for Windows ■ –WinMerge ■ ■Checklists 19

20 Secure Host Configurations ■What do we look for? –Service Packs, Hot Fixes, open ports, processes, IP settings, installed software –Disk information - using NTFS –Shares and permissions –Accounts – password settings –Users – Name of Administrator and Guest, password required and expiration for users –Groups –Rights –Registry security settings –Services – Host-based security applications (AV, HIDS, firewall) –Audit settings –File ACL and auditing –Registry ACL and auditing 20

21 Other Sources of Vulnerabilities ■Network diagrams –Relationship between systems and network segments ■Nessus reports –Scanners lie ■Interviews –You get to ask the admin any clarification about what you have seen ■The rest of your team 21

22 Questions 22

23 Port Scans ■Interesting Windows Ports –25 SMTP –20,21 FTP –23 TELNET –53 DNS –80, 8080, 8088 HTTP –88 Kerberos –135 RPC/DCE Endpoint mapper –137 NetBIOS Name Service –138 NetBIOS Datagram Service –139 NetBIOS Session Service (SMB/CIFS over NetBIOS) –161 SNMP –389 LDAP –443 HTTPS –445 Direct Host –464 Kerberos kpasswd –500 Inet Key Exch, IKE (IPSec) –593 HTTP RPC Endpoint Mapper –636 LDAP over SSL/TLS –1433 MS-SQL Server –1434 MS-SQL Monitor –3268 AD Global Catalog –3269 AD Global Catalog over SSL –3389 Windows Terminal Server –1243, 6711, 6776, 1349, 12345, 12346, – Trojan Ports * 23