PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Slides:



Advertisements
Similar presentations
Firewall Simulation Teaching Information Security Using: Visualization Tools, Case Studies, and Hands-on Exercises May 23, 2012.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Web Server Administration TEC 236 Securing the Web Environment.
Chapter 7 HARDENING SERVERS.
Windows 2003 SP1 Member Server in ASU Active Directory WNUG/CCC February 2, 2006 Sharon Bushart CLAS Information Technology.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Lesson 19: Configuring Windows Firewall
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Workshop 1: Introduction to TCP/IP
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
Hands-On Ethical Hacking and Network Defense Chapter 8 Microsoft Operating System Vulnerabilities.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
COMP1321 Digital Infrastructure Richard Henson February 2014.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hosted by 10 Best Practices for Windows Security How many of them are you doing? Roberta Bragg HCWT.
Access Control List (ACL)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Windows NT Based Web Security COSC 573 By:Ying Li.
NT4 SP4 Security Jack Schmidt - Fermilab
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Small Business Security Keith Slagle April 24, 2007.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
TCOM Information Assurance Management System Hacking.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Module 10: Windows Firewall and Caching Fundamentals.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
Module 8 Implementing Security Using Group Policy.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
Windows Administration How to protect your computer.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Overview Microsoft Windows XP Pro (SP2) Microsoft Windows Server 2003 User accounts and groups File sharing and file permissions Password/Lockout Policy.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Enumeration.
Introduction to Operating Systems
Chapter 6 Application Hardening
Managing Secure Network Systems
Securing the Network Perimeter with ISA 2004
Chapter 4: Security Baselines
Network Operating Systems Examples
Chapter 27: System Security
Lesson 16-Windows NT Security Issues
Firewalls Routers, Switches, Hubs VPNs
Firewalls Jiang Long Spring 2002.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation Guidelines As recommended by corporate officials, programmers and hackers. By William White

Introduction Windows NT is easy to secure, compared to some other systems.Windows NT is easy to secure, compared to some other systems. As long as you take some necessary steps, your system will be reasonably secure.As long as you take some necessary steps, your system will be reasonably secure.

Securing Windows NT consists of two main areas: Putting filters between your network and the Internet.Putting filters between your network and the Internet. Configuring workstations and servers against unauthorized access.Configuring workstations and servers against unauthorized access.

Filters for your Network Firewalls.Firewalls. Packet Filtering.Packet Filtering.

Firewalls Set your firewall to disable everything, then enable only the access you need.Set your firewall to disable everything, then enable only the access you need. Firewalls are effective, but they have two major problems:Firewalls are effective, but they have two major problems: 1) High cost.1) High cost. 2) It is hard for users on your network to access the Internet.2) It is hard for users on your network to access the Internet.

Packet Filtering Because much traffic goes through two ports, you can:Because much traffic goes through two ports, you can: 1) Enable packet filtering.1) Enable packet filtering. 2) Disable port 138, which handles UDP packets.2) Disable port 138, which handles UDP packets. 3) Disable port 139, which handles TCP packets.3) Disable port 139, which handles TCP packets.

Other Ports to Block with Packet Filtering Service Name Port Type Port Name DirectionService Name Port Type Port Name Direction FTP 20 tcp ftp-data incoming FTP 20 tcp ftp-data incoming FTP 21 tcp ftp incoming FTP 21 tcp ftp incoming Telnet 23 tcp telnet incoming Telnet 23 tcp telnet incoming Mail 25 tcp smtp incoming Mail 25 tcp smtp incoming NFS 111 tcp portmapper both NFS 111 tcp portmapper both NFS 111 udp portmapper both NFS 111 udp portmapper both Administration 161 udp snmp both Administration 161 udp snmp both Administration 162 udp snmp both Administration 162 udp snmp both

Disable Netbeui over TCP/IP. In control panel->network->bindings disable these:In control panel->network->bindings disable these: 1) NetBIOS Interface -> WINS Client(TCP/IP) -> ethernet.1) NetBIOS Interface -> WINS Client(TCP/IP) -> ethernet. 2) Server -> WINS Client(TCP/IP) -> ethernet.2) Server -> WINS Client(TCP/IP) -> ethernet. 3) Workstation -> WINS Client(TCP/IP) -> ethernet.3) Workstation -> WINS Client(TCP/IP) -> ethernet.

Configuring Workstations and Servers against Unauthorized Access: 1) Disable the Guest account.1) Disable the Guest account. 2) Rename Administrator account to something non-obvious.2) Rename Administrator account to something non-obvious. 3) Enable password lock-out user policy.3) Enable password lock-out user policy.

Configuration of Workstations and Servers -- continued: 4) Set up accounts with passwords for all local workstations.4) Set up accounts with passwords for all local workstations. 5) Use long, difficult to guess passwords.5) Use long, difficult to guess passwords. 6) Keep you administrative passwords known to a very minimal group of people.6) Keep you administrative passwords known to a very minimal group of people.

Configuration of Workstations and Servers -- continued: 7) Change your passwords regularly.7) Change your passwords regularly. 8) Create a backup administrative account, with some complicated password written somewhere outside of the computer system.8) Create a backup administrative account, with some complicated password written somewhere outside of the computer system. 9) Never keep passwords on the disk.9) Never keep passwords on the disk.

Configuration of Workstations and Servers -- continued: 10) Don't install FTP Server except for a very restricted area.10) Don't install FTP Server except for a very restricted area. Check if FTP User has permissions to other areas of the server. Check if FTP User has permissions to other areas of the server. 11) Don't use Telnet daemon at all.11) Don't use Telnet daemon at all. 12) Don't use your administrative passwords in any other place, neither in the computer, nor in real life.12) Don't use your administrative passwords in any other place, neither in the computer, nor in real life.

Configuration of Workstations and Servers -- continued: 13) Remove Share Permissions to the Everyone group.13) Remove Share Permissions to the Everyone group. 14) Remove Network Access for the Everyone group.14) Remove Network Access for the Everyone group. 15) If you use PERL for CGI programs, DO NOT put perl.exe into the web server's cgi bin directory.15) If you use PERL for CGI programs, DO NOT put perl.exe into the web server's cgi bin directory.

Configuration of Workstations and Servers -- continued: 16) Restrict FTP.16) Restrict FTP. 17) Implement APOP, if you use POP3.17) Implement APOP, if you use POP3. 18) Adjust RAS parameters.18) Adjust RAS parameters.

Configuration of Workstations and Servers -- continued: 19) Keep track of logons and security failures.19) Keep track of logons and security failures. 20) Check the security log regularly.20) Check the security log regularly. 21) Run the C2 Configuration Manager.21) Run the C2 Configuration Manager.

Configuration of Workstations and Servers -- continued: 22) Remove the Bypass Traverse Checking right from all user accounts.22) Remove the Bypass Traverse Checking right from all user accounts. 23) Install all NT Service Packs.23) Install all NT Service Packs.

Examples of Past Attacks on Windows NT: L0phtcrack 1.5 and the "PW Crack" attack L0phtcrack 1.5 and the "PW Crack" attack The "GetAdmin” program The "GetAdmin” program The "Red Button" attack The "Red Button" attack

Examples of Recent Attacks on Windows NT: IE5 Allows File Creation and Modification -- 8/24/1999.IE5 Allows File Creation and Modification -- 8/24/1999. The “Java VM Sandbox” attack -- 8/26/1999.The “Java VM Sandbox” attack -- 8/26/1999.

Close Microsoft releases many fixes for known problems in the form of Hotfixes, Service Packs and new Releases.Microsoft releases many fixes for known problems in the form of Hotfixes, Service Packs and new Releases. There is a tradeoff between Security and Usefulness.There is a tradeoff between Security and Usefulness. Vigilance is the price of Liberty.Vigilance is the price of Liberty.