Асоциация за информационна сигурност www.iseca.org Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200,

Slides:



Advertisements
Similar presentations
Ethical Hacking Module IV Enumeration.
Advertisements

Expose the Vulnerability Paul Hogan Ward Solutions.
Paula Kiernan Senior Consultant Ward Solutions
System Center Configuration Manager Push Software By, Teresa Behm.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Chapter 7 HARDENING SERVERS.
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
CSE331: Introduction to Networks and Security Lecture 15 Fall 2002.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Enumeration. Local IP addresses Local IP addresses (review)  Some special IP addresses  localhost (loopback address)  Internal networks 
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Hacking Web Server Defiana Arnaldy, M.Si
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Chapter 11 Phase 5: Covering Tracks and Hiding. Attrition Web Site  Contains an archive of Web vandalism attacks
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
The Deep Technical Audit: How to Identify and Mitigate Risks Presented in Other Sessions David J. Goldman Joseph Nocera.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
Chapter 6 Enumeration Modified Objectives  Describe the enumeration step of security testing  Enumerate Microsoft OS targets  Enumerate NetWare.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hands-On Ethical Hacking and Network Defense
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Attacks Against Database By: Behnam Hossein Ami RNRN i { }
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
OS Hardening Justin Whitehead Francisco Robles. ECE Internetwork Security OS Hardening Installing kernel/software patches and configuring a system.
Software Security Testing Vinay Srinivasan cell:
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
FrontPage: 2003 Exploiting, Abusing, and Securing the FrontPage Server Extensions on Windows Server 2003 Mark Burnett.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
Safeguarding your Business Assets through Understanding of the Win32 API.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Cracking Techniques Onno W. Purbo
Crash Course in Web Hacking
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Enumeration After scanning for live systems and services, hackers will probe the services more carefully looking for weaknesses This involves active connections!
TCOM Information Assurance Management System Hacking.
Announcements RSA Security Conference (extra credit) RSA Security Conference (extra credit) –April 7 through April 11, San Francisco –Visit the Forum for.
Module 04: 1 Introduction to Computer Security and Information Assurance Objectives Describe major OS functions Recognize OS related threats Apply major.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
 Computer Network Attack  “… actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Hacking Windows.
Port Scanning James Tate II
Enumeration.
Penetration Test Debrief
Secure Software Confidentiality Integrity Data Security Authentication
Onno W. Purbo Cracking Techniques Onno W. Purbo
Lecture 2 - SQL Injection
Operating System Security
Lecture 3: Secure Network Architecture
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Асоциация за информационна сигурност Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200, ФМИ, 19:00 Лекция 3.11 :-) Windows

Windows  General Windows  User roles  Type of targets  Type of attacks  Example attacks  Attack prevention  Hardening Windows

Windows general  Windows role  Windows and the others  Patch management  Today role of the security

User Roles  Local System  Administrator  User  Special Roles

Type of targets  Services  Applications  Registry  Users  Permissions  Passwords

Type of attacks  Information gathering Error messages enumerations  Programming errors Buffer overflows Format strings Other

Type of attacks  DoS resource consume Others  Misconfiguration  Privileges More privileges Not dropped privileges

Type of attacks  User Lack of security knowledge Misleading Boredom  Local attacks On site  Password dumping Off site

Type of attacks  Hiding Root Kits NTFS Registry

Example attacks  Information gathering Snmpwalk Path disclosure Banner matching  Programming errors Code red – IIS /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u909 0%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090 %u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a

Example attacks  SASSER  Local Security Authority Subsystem Service - Lsasrv.dll RPC buffer overflow  allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file  Windows WMF  The vulnerability is caused due to an error in the handling of Windows Metafile files (‘.wmf’) containing specially crafted SETABORTPROC ‘Escape’ records. Such records allow arbitrary user-defined function to be executed when the rendering of a WMF file fails.” According to the Windows 3.1 SDK docs, the SETABORTPROC escape was obsoleted and replaced by the function of the same name in Windows 3.1, long before the WMF vulnerability took advantage of it  Local privileges escalation attacks

Example attacks  Microsoft Word document handling buffer overflow  A memory corruption vulnerability in Microsoft Word could allow a remote attacker to execute arbitrary code with the privileges of the user running Word.

Example attacks  DoS TCP/IP Microsoft Windows 2000 empty TCP packet denial of service  Microsoft Windows 2000 is vulnerable to a denial of service attack. A remote attacker can send a stream of empty TCP packets to the NetBIOS port (TCP port 139) to consume all available system memory Applications IIS DOS  POST /_vti_bin/shtml.dll HTTP/1.0 Host: [32762 '/' characters] Content-length: 22 This will cause the web service to consume 99% of the CPU for about 35 seconds. During this time, no other HTTP requests will be serviced.

Example attacks  Enumerations Shares  Netbios Auditing Tool Accounts LC 5 Other bindview enum  enum is a console-based Win32 information enumeration utility. Using null sessions, enum can retrieve userlists, machine lists, sharelists, namelists, group and member lists, password and LSA policy information. enum is also capable of a rudimentary brute force dictionary attack on individual accounts.

Example attacks  Misconfiguration Registry permissions Files / Directory permissions  Privileges Higher privileges than needed

Example attacks  Hiding Root kits Trojans

Attack prevention  OS side DEP – Data Execution Prevention Randomization Safe libs Registry tweaks  IDS Deep packet inspection Honeypots  Updates

Hardening  Safe coding  Best practices  Lock tools  Education of users  Good security polices Password polices Access polices