Paula Januszkiewicz IT Security Auditor, MVP, MCT ISCG Session Code: SIA308.

Slides:



Advertisements
Similar presentations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Advertisements

© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Windows 8 (1) (2) (3) Windows 8 (1) (2) (3)
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Purchase Requisitions - Requester © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Co- location Mass Market Managed Hosting ISV Hosting.
Windows 7 Training. Windows ® 7 Compatibility Installer Detection.
Windows 7 Training Microsoft Confidential. Windows ® 7 Compatibility Version Checking.
Multitenant Model Request/Response General Model.
“Some of the largest and medium-sized U.S. airports report close to 637,000 laptops lost each year, according to the Ponemon Institute survey released.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Announcing Demo Announcing.
Session 1.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
 Rico Mariani Architect Microsoft Corporation.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
WinHEC /22/2017 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Feature: Print Remaining Documents © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Connect with life Connect with life
NEXT: Overview – Sharing skills & code.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Paula Januszkiewicz IT Security Auditor, MVP Enterprise Security, MCT Women in Technology CQURE SESSION CODE: SIA333.
Feature: Suggested Item Enhancements – Sales Script and Additional Information © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Ian Ellison-Taylor General Manager Microsoft Corporation PC27.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
demo Instance AInstance B Read “7” Write “8”

customer.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
demo Demo.
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
The CLR CoreCLRCoreCLR © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.

Возможности Excel 2010, о которых следует знать
SIA304 Learning the Basics of Penetration Testing!
Sysinternals Tutorials
11/21/2018 4:57 AM SIA303 Advanced Persistent Threats (APT): Understanding the New Era of Attacks! Marcus Murray Security Team Manager, Microsoft MVP –
What’s New In ASP.NET MVC 2
Baseline: How Are We Doing Now?
Twenty Windows Tools You Never Knew Existed
Title of Presentation 12/2/2018 3:48 PM
Brian Keller Sr. Technical Evangelist Microsoft Session Code: DEV310
MAP & ACT Pre deployment planning for Windows 7 or Server 2008 R2
The Dirty Dozen: Windows PowerShell Scripts for the Busy DBA
Brian Keller Sr. Technical Evangelist Microsoft Session Code: DEV310
Building Silverlight Apps with RIA Services
2/28/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Tech Ed North America /12/2019 6:45 AM Required Slide
8/04/2019 9:13 PM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
A Lap Around Internet Explorer 9 For Developers
Windows 8 Security Internals
Виктор Хаджийски Катедра “Металургия на желязото и металолеене”
Hack-proofing your Clients using Windows 7 Security!
Шитманов Дархан Қаражанұлы Тарих пәнінің
Lap Around the Windows Azure Platform
Building BI applications using PowerPivot for Excel
Title of Presentation 5/24/2019 1:26 PM
7/5/2019 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
日本初公開!? Vista の新機能を実演 とっちゃん わんくま同盟 7/23/2019 9:09 AM
Presentation transcript:

Paula Januszkiewicz IT Security Auditor, MVP, MCT ISCG Session Code: SIA308

Agenda Hacker role in IT development Hacker Techniques and Demos Things you should remember and summary

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language...

Hacker role in IT development Make IT security world running Encourage us to be up to date Test the newest technology What is the difference between techniques and habits?

At first…

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language...

Check who are you talkin’ to My DNS is… My mail server is… I am the administrator, my name is… nslookup >set type=all >victim.com

Check who are you talkin’ to

Check yourself, they do fingerprinting Interesting ports on : Not shown: 1694 closed ports PORT STATE SERVICE 21/tcp open war-ftpd 25/tcp open smtp 42/tcp open nameserver 53/tcp open domain 80/tcp open http 88/tcp open kerberos-sec 119/tcp open nntp 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds (…) 3389/tcp open ms-term-serv Device type: general purpose Running (JUST GUESSING) : Microsoft Windows 2003 (94%)  Nmap printout

Internet Printing What can you find about yourself?

Then…

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language...

Offline access Bypasses operating system’s security mechanisms Access Control Lists (ACL) Watchdogs Open files SAM database - allows password reset Easy to use by each user Difficult to use by externals

Offline access Access to the damaged system File recovery Password recovery Full disk problems

Offline access How to recover from the system crash

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit Keep your knownledge up to date

Hotfix analysis Why Hotfixes are released? Hacker’s usage Change analysis Vulnerability / improper system setting area Limited time Administrator’s usage What will be changed if I install it? Should I really need this?

Hotfix analysis What is inside?

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit Keep your knownledge up to date

Use Debugger Variable choices SoftICE WinDbg DEBUG IDA Pro One idea: to look through the code and data structures Administrators: Crash dump analysis Process Explorer

Windows Debugger, Process Explorer Crash Dump Analysis, System Deep-Dive

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit Keep your knownledge up to date

Why Data Protection Matters “More than 100 USB memory sticks, some containing secret information, have been lost or stolen from the Ministry of Defense since 2004, it has emerged.” BBC News July 2008 – BBC News July 2008 “More than 100 USB memory sticks, some containing secret information, have been lost or stolen from the Ministry of Defense since 2004, it has emerged.” BBC News July 2008 – BBC News July 2008 “Some of the largest and medium-sized U.S. airports report close to 637,000 laptops lost each year, according to the Ponemon Institute survey released Monday” PC World June 2008 – PC World June 2008 “Some of the largest and medium-sized U.S. airports report close to 637,000 laptops lost each year, according to the Ponemon Institute survey released Monday” PC World June 2008 – PC World June 2008

Use data encryption Different levels of encryption File format level Active Directory Rights Management Services 3rd party tools – for single files / folders System level Volume level, hardware based Can be used together Prevents offline attacks

Use transmission encryption Different levels of encryption Application / Format Based Secure Socket Layer IPSec / tunneling (PPTP, L2LP) Physical encryption Makes data disclosure and manipulation harder

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit Keep your knownledge up to date

Know at least one scripting language Hackers love scripts Perl Python You should love PowerShell 2.0 Server Role management modules Server management Remoting Microsoft Common Criteria

Windows PowerShell Account Enumeration, Service Accounts, Service Location

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users At least scripting language...

Test your users Play a social engineer role Monitor them… …and show you do it Break users’ passwords Train them well

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit At least scripting language...

Have your own toolkit Internet Browser is sometimes enough CMD and build-in system tools Specialist tools Your own scripts Social engineering skills PowerShell 2.0

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit Keep your knownledge up to date

Keep your knowledge up to date IT resources Mailing Lists Blogs / RSS Webcasts Know law regulations in your country Security bulletins Microsoft SANS ISS Other

Hacker Role in IT Development Check who are you talkin’ to Summary Offine access Hotfix analysis Windows Debugger Encryption + protection At least scripting language... Test your users Have your own toolkit Keep your knownledge up to date

Summary Hackers are evil but usually very smart, we can learn a lot Human nature, not technology is the key to defense against penetration attempts Hacker succeed because they learn faster then administrators...and test all demos at home!

Whenever you want …or meet me in the ATE booth!

Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!

Track Resources

Sessions On-Demand & Community Resources for IT Professionals Resources for Developers Microsoft Certification & Training Resources Resources

© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.