Hands-On Ethical Hacking and Network Defense Chapter 8 Microsoft Operating System Vulnerabilities.

Slides:



Advertisements
Similar presentations
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Advertisements

Paula Kiernan Senior Consultant Ward Solutions
System Security Scanning and Discovery Chapter 14.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Chapter 7 HARDENING SERVERS.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 6 Enumeration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Hands-On Microsoft Windows Server 2008
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities.
Chapter 8 Desktop and Server OS Vulnerabilities. Objectives  After reading this chapter and completing the exercises, you will be able to:  Describe.
Hands-On Ethical Hacking and Network Defense
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 14: Configuring Server Security Compliance
The Microsoft Baseline Security Analyzer A practical look….
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
1 Chapter Overview Preparing to Upgrade Performing a Version Upgrade from Microsoft SQL Server 7.0 Performing an Online Database Upgrade from SQL Server.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Hacking Windows and Windows Security Lesson 10. Windows 9X/Me/NT There are still some folks out there using Windows 95 and 98, ME, 2000, and NT. Remote.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
TCOM Information Assurance Management System Hacking.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Module 7: Implementing Security Using Group Policy.
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Last updated
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities Last modified
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
How to Mitigate Stay Safe. Patching Patches Software ‘fixes’ for vulnerabilities in operating systems and applications Why Patch Keep your system secure.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Chapter 8 Desktop and Server OS Vulnerabilities. Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 5 : Designing Windows Server-Level Security Processes
Hands-On Ethical Hacking and Network Defense
Lesson 16-Windows NT Security Issues
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Hands-On Ethical Hacking and Network Defense Chapter 8 Microsoft Operating System Vulnerabilities

2 Objectives Tools to assess Microsoft system vulnerabilities Describe the vulnerabilities of Microsoft operating systems and services Techniques to harden Microsoft systems against common vulnerabilities Best practices for securing Microsoft systems

3 Tools to Identify Vulnerabilities on Microsoft Systems Many tools are available for this task Using more than one tool is advisable Using more than one tool is advisable Using several tools help you pinpoint problems more accurately

4 Built-in Microsoft Tools Microsoft Baseline Security Analyzer (MBSA) WinfingerprintHFNetChk

5 Effective tool that checks for Patches Patches Security updates Security updates Configuration errors Configuration errors Blank or weak passwords Blank or weak passwords Others Others MBSA supports remote scanning Associated product must be installed on scanned computer Associated product must be installed on scanned computer

6 MBSA Results

7

8

9 MBSA Versions 2.x for Win 2000 or later & Office XP or later if you have older products After installing, MBSA can Scan the local machine Scan the local machine Scan other computers remotely Scan other computers remotely Be scanned remotely over the Internet Be scanned remotely over the Internet

10 HFNetChk HFNetChk is part of MBSA Available separately from Shavlik Technologies Available separately from Shavlik Technologies Can be used to control the scanning more precisely, from the command line Can be used to control the scanning more precisely, from the command line

11 Winfingerprint Administrative tool It can be used to scan network resources Exploits Windows null sessions Detects NetBIOS shares NetBIOS shares Disk information and services Disk information and services Null sessions Null sessions

12 Winfingerprint Can find OS detection OS detection Service packs and hotfixes Service packs and hotfixes Running Services Running Services See Proj X6 for Details See Proj X6 for Details

13 Microsoft OS Vulnerabilities Microsoft integrates many of its products into a single package Such as Internet Explorer and Windows OS Such as Internet Explorer and Windows OS This creates many useful features This creates many useful features It also creates vulnerabilities It also creates vulnerabilities Security testers should search for vulnerabilities on The OS they are testing The OS they are testing Any application running on the server Any application running on the server

14 CVE (Common Vulnerabilities and Exposures ) A list of standardized names for vulnerabilities Makes it easier to share information about them cve.mitre.org (link Ch 8c) cve.mitre.org (link Ch 8c) Demonstration: Search Demonstration: Search

15 Remote Procedure Call (RPC) RPC is an interprocess communication mechanism Allows a program running on one host to run code on a remote host Allows a program running on one host to run code on a remote host Examples of worms that exploited RPC MSBlast (LovSAN, Blaster) MSBlast (LovSAN, Blaster) Nachi Nachi Use MBSA to detect if a computer is vulnerable to an RPC-related issue

16 NetBIOS Software loaded into memory Enables a computer program to interact with a network resource or other device Enables a computer program to interact with a network resource or other device NetBIOS is not a protocol NetBIOS is an interface to a network protocol NetBIOS is an interface to a network protocol It’s sometimes called a session-layer protocol, or a protocol suite (Links Ch 8d, 8e, 8f) It’s sometimes called a session-layer protocol, or a protocol suite (Links Ch 8d, 8e, 8f)

17 NetBEUI NetBIOS Extended User Interface Fast, efficient network protocol Fast, efficient network protocol Allows NetBIOS packets to be transmitted over TCP/IP Allows NetBIOS packets to be transmitted over TCP/IP NBT is NetBIOS over TCP NBT is NetBIOS over TCP

18 NetBIOS (continued) Newer Microsoft OSs do not need NetBIOS to share resources NetBIOS is used for backward compatibility NetBIOS is used for backward compatibility You can turn off NetBIOS for Windows 2000 and later (links Ch 8g & 8h) You can turn off NetBIOS for Windows 2000 and later (links Ch 8g & 8h)

19 Server Message Block (SMB) Used by Windows 95, 98 and NT to share files Usually runs on top of NetBIOS, NetBEUI or TCP/IP Hacking tools L0phtcrack’s SMB Packet Capture utility L0phtcrack’s SMB Packet Capture utility SMBRelay SMBRelay Ettercap (see Project 23, Links Ch 8r & 8s) Ettercap (see Project 23, Links Ch 8r & 8s)

20 Demonstration: ettercap

21 Common Internet File System (CIFS) CIFS replaced SMB for Windows 2000, XP, and Windows 2003 Server SMB is still used for backward compatibility SMB is still used for backward compatibility CIFS is a remote file system protocol Enables computers to share network resources over the Internet Enables computers to share network resources over the Internet

22 Common Internet File System (CIFS) (continued) Enhancements over SMB Resource locking (if 2 people use the same thing at once) Resource locking (if 2 people use the same thing at once) Support for fault tolerance Support for fault tolerance Capability to run more efficiently over dial-up Capability to run more efficiently over dial-up Support for anonymous and authenticated access Support for anonymous and authenticated access

23 Common Internet File System (CIFS) (continued) Server security methods Share-level security Share-level security A password assigned to a shared resource User-level security User-level security An access control list assigned to a shared resource Users must be on the list to gain access Passwords are stored in an encrypted form on the server Passwords are stored in an encrypted form on the server But CIFS is still vulnerable (see link Ch 8n) Don’t let NetBIOS traffic past the firewall Don’t let NetBIOS traffic past the firewall

24 Understanding Samba Open-source implementation of CIFS Created in 1992 Created in 1992 Samba allows sharing resources over multiple OSs Samba accessing Microsoft shares can make a network susceptible to attack Samba is used to “trick” Microsoft services into believing the *NIX resources are Microsoft resources

25 Samba is Built into Ubuntu Click Places, Connect to Server Windows shares are marked with SMB Windows shares are marked with SMB

26 Closing SMB Ports Best way to protect a network from SMB attacks Routers should filter out ports Routers should filter out ports 137 to

27 Default Installations Windows 9x, NT, and 2000 all start out with many services running and ports open They are very insecure until you lock them down They are very insecure until you lock them down Win XP, 2003, and Vista are much more secure by default Services are blocked until you open them Services are blocked until you open them

28 Passwords and Authentication A comprehensive password policy is critical Change password regularly Change password regularly Require passwords length of at least six characters Require passwords length of at least six characters Require complex passwords Require complex passwords Never write a password down or store it online or on the local system Never write a password down or store it online or on the local system Do not reveal a password over the phone Do not reveal a password over the phone

29 Passwords and Authentication Configure domain controllers Enforce password age, length and complexity Enforce password age, length and complexity Account lockout threshold Account lockout threshold Account lockout duration Account lockout duration Start, Run, GPEDIT.MSC

30 IIS (Internet Information Services) IIS 5 and earlier installs with critical security vulnerabilities Run IIS Lockdown Wizard (link Ch 8p) Run IIS Lockdown Wizard (link Ch 8p) IIS 6.0 installs with a “secure by default” posture Configure only services that are needed Configure only services that are needed Windows 2000 ships with IIS installed by default Windows 2000 ships with IIS installed by default Running MBSA can detect IIS running on your network Running MBSA can detect IIS running on your network

31 IIS Buffer Overflows

32 SQL Server SQL vulnerabilities exploits areas The SA account with a blank password The SA account with a blank password SQL Server Agent SQL Server Agent Buffer overflow Buffer overflow Extended stored procedures Extended stored procedures Default SQL port 1433 Default SQL port 1433 Vulnerabilities related to SQL Server 7.0 and SQL Server 2000

33 The SA Account The SA account is the master account, with full rights SQL Server 6.5 and 7 installations do not require setting a password for this account SQL Server 2000 supports mixed-mode authentication SA account is created with a blank password SA account is created with a blank password SA account cannot be disabled SA account cannot be disabled

34 SQL Server Agent Service mainly responsible for Replication Replication Running scheduled jobs Running scheduled jobs Restarting the SQL service Restarting the SQL service Authorized but unprivileged user can create scheduled jobs to be run by the agent

35 Buffer Overflow Database Consistency Checker in SQL Server 2000 Contains commands with buffer overflows Contains commands with buffer overflows SQL Server 7 and 2000 have functions that generate text messages They do not check that messages fit in the buffers supplied to hold them They do not check that messages fit in the buffers supplied to hold them Format string vulnerability in the C runtime functions

36 Extended Stored Procedures Several of the extended stored procedures fail to perform input validation They are susceptible to buffer overruns They are susceptible to buffer overruns

37 Default SQL Port 1443 SQL Server is a Winsock application Communicates over TCP/IP using port 1443 Communicates over TCP/IP using port 1443 Spida worm Scans for systems listening on TCP port 1443 Scans for systems listening on TCP port 1443 Once connected, attempts to use the xp_cmdshell Once connected, attempts to use the xp_cmdshell Enables and sets a password for the Guest account Changing default port is not an easy task

38 Best Practices for Hardening Microsoft Systems Penetration tester Finds vulnerabilities Finds vulnerabilities Security tester Finds vulnerabilities Finds vulnerabilities Gives recommendations for correcting found vulnerabilities Gives recommendations for correcting found vulnerabilities

39 Patching Systems The number-one way to keep your system secure Attacks take advantage of known vulnerabilities Attacks take advantage of known vulnerabilities Options for small networks Options for small networks Accessing Windows Update manually Automatic Updates This technique does not really ensure that all machines are patched at the same time This technique does not really ensure that all machines are patched at the same time Does not let you skip patches you don’t want Does not let you skip patches you don’t want

40 Patching Systems Some patches cause problems, so they should be tested first Options for patch management for large networks Systems Management Server (SMS) Systems Management Server (SMS) Software Update Service (SUS) Software Update Service (SUS) Patches are pushed out from the network server after they have been tested

41 Antivirus Solutions An antivirus solution is essential For small networks Desktop antivirus tool with automatic updates Desktop antivirus tool with automatic updates For large networks Corporate-level solution Corporate-level solution An antivirus tool is almost useless if it is not updated regularly

42 Enable Logging and Review Logs Regularly Important step for monitoring critical areas Performance Performance Traffic patterns Traffic patterns Possible security breaches Possible security breaches Logging can have negative impact on performance Review logs regularly for signs of intrusion or other problems Use a log-monitoring tool Use a log-monitoring tool

43 Disable Unused or Unneeded Services Disable unneeded services Delete unnecessary applications or scripts Unused applications or services are an invitation for attacks Requires careful planning Close unused ports but maintain functionality Close unused ports but maintain functionality

44 Other Security Best Practices Use a firewall on each machine, and also a firewall protecting the whole LAN from the Internet Use a firewall on each machine, and also a firewall protecting the whole LAN from the Internet Delete unused scripts and sample applications Delete unused scripts and sample applications Delete default hidden shares Delete default hidden shares Use different names and passwords for public interfaces Use different names and passwords for public interfaces

45 Other Security Best Practices Be careful of default permissions Be careful of default permissions For example, new shares are readable by all users in Win XP Use available tools to assess system security Use available tools to assess system security Like MBSA, IIS Lockdown Wizard, etc. Disable the Guest account Disable the Guest account Rename the default Administrator account Rename the default Administrator account Enforce a good password policy Enforce a good password policy Educate users about security Educate users about security Keep informed about current threats Keep informed about current threats