Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.4. Lab Manual.

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

IMS Client Installation Procedures 1. Copy the Voic Pro from the shared folder on the Voic Pro server. Go to Start, Run, and \\ or \\
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS1: Overview of Operating Systems 1.1. Windows.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
© Neeraj Suri EU-NSF ICT March 2006 Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Zoltán Micskei
Module 4: Implementing User, Group, and Computer Accounts
© Neeraj Suri EU-NSF ICT March 2006 Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Zoltán Micskei
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Terminal Server © N. Ganesan, Ph.D.. Reference Thin-Client Concept Thin-Client concept tutorial.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék Scheduling in Windows Zoltan Micskei
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Windows Security Mechanisms Al Bento - University of Baltimore.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS4: Scheduling and Dispatch 4.6. Demos.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
7.3. Windows Security Descriptors
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS3: Concurrency 3.5. Lab Slides & Lab Manual.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Module 6: Configuring User Environments Using Group Policy.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS5: Memory Management 5.5. Lab Manual.
Unit OS8: File System 8.6. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows Operating.
Security Windows 2000 Richard Goldman © December 4, 2001.
Unit OS11: Performance Evaluation Lab Manual.
Unit OS A: Windows Networking A.4. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows.
Unit OS6: Device Management 6.4. Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
Unit OS12: Scripting Lab Manual. 2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows Operating.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.1. The Security Problem.
Module 5: Managing Access to Objects in Organizational Units.
MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
NetTech Solutions Security and Security Permissions Lesson Nine.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS3: Concurrency 3.3. Advanced Windows Synchronization.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS1: Overview of Operating Systems 1.1. Windows.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Unit OS7: Security 7.4. Quiz Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze.
Unit OSC: Interoperability
Unit OS9: Real-Time and Embedded Systems
Unit OS4: Scheduling and Dispatch
Unit OS11: Performance Evaluation
Unit OS A: Windows Networking
Unit OS8: File System 8.6. Quiz
Unit OS2: Operating System Principles
Unit OSB: Comparing the Linux and Windows Kernels
Users and Accounts Lab 0.1. Users and Accounts Lab 0.1.
Giới thiệu : Trong Windows XP trở về sau, tích hợp sẵn 1 công cụ rất hay đó là Group Policy. Group Policy là 1 trong các thành phần của Microsoft Management.
Giới thiệu : Trong Windows XP trở về sau, tích hợp sẵn 1 công cụ rất hay đó là Group Policy. Group Policy là 1 trong các thành phần của Microsoft Management.
Unit OS5: Memory Management
3.3. Advanced Windows Synchronization
Windows Security By, Omkar Sravan Kasinadhuni.
Setting up home folders and roaming profiles
Presentation transcript:

Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.4. Lab Manual

2 Copyright Notice © David A. Solomon and Mark Russinovich These materials are part of the Windows Operating System Internals Curriculum Development Kit, developed by David A. Solomon and Mark E. Russinovich with Andreas Polze Microsoft has licensed these materials from David Solomon Expert Seminars, Inc. for distribution to academic organizations solely for use in academic environments (and not for commercial use)

3 Roadmap for Section 7.4. Lab experiments investigating: Viewing Security Processes Looking at the SAM Viewing Access Tokens Looking at Security Identifiers (SIDs) Viewing a Security Descriptor structure Investigating ordering of Access Control Entries (ACEs) Investigating Privileges

4 Looking at the SAM Look at HKLM\SAM permissions SAM security allows only the local system account to access it Run Regedit Look at HKLM\SAM - nothing there? Check permissions (right click->Permissions) Close Regedit Look in HKLM\SAM Running Regedit in the local system account allows you to view the SAM: psexec –s –i –d c:\windows\regedit.exe View local usernames under HKLM\SAM\SAM\Domains\Account\Users\Names Passwords are under Users key above Names

5 Viewing Access Tokens Process Explorer: double click on a process and go to Security tab Examine groups list Use RUNAS to create a CMD process running under another account (e.g. your domain account) Examine groups list Viewing tokens with the Kernel Debugger Run !process 0 0 to find a process Run !process PID to dump the process Get the token address and type !token – n Get the token address and type !token – n Type dt _token to see all fields defined in a token

6 Using PsGetSid to View Account SIDs Example SIDs Lab: run PsGetSid (Sysinternals) to view the SID of your username and of the computer Domain SID: S First account: S Admin account: S

7 Viewing a Security Descriptor Structure Get the address of an EPROCESS block with !process Type !object on that address Type “dt _OBJECT_HEADER” on the object header address to get the security descriptor address Type !sd & -8 1

8 Understanding permissions as presented by GUI Security Editors Go to a NTFS file Add an Everyone deny-all to a file Will the Administrator be able to look at the file? Verify your answer by checking Effective Permissions

9 View Audit Options Run Secpol.msc and view Local Policies->Audit Policy

10 Seeing a Privilege Get Enabled Run Secpol.msc and examine full list Click on Local Policies->User Rights assignment Process Explorer: double click on a process, go to security tab, and examine privileges list Watch changes to privilege list: 1. Run Process Explorer – put in paused mode 2. Open Control Panel applet to change system time 3. Go back to Process Explorer & press F5 4. Examine privilege list in new process that was created 5. Notice in privilege list that system time privilege is enabled

11 Observe the Bypass Traverse Checking Privilege View the use of the backup privilege: Make a directory Create a file in the directory Use the security editor to remove inherited security and give Everyone full access to the file Remove all access to the directory (do not propagate) Start a command-prompt and do a “dir” of the directory Run PView and enable the Backup privilege for the command prompt Do another “dir” and note the different behavior View the use of the Bypass-Traverse Checking privilege (internally called “Change Notify”) From the same command prompt run notepad to open the file (give the full path) in the inaccessible directory Extra credit: disable Bypass-Traverse Checking so that you get access denied trying to open the file (hint: requires use of secpol.msc and then RUNAS)