Download presentation
Presentation is loading. Please wait.
Published byNancy Sanders Modified over 9 years ago
1
TCOM 59901 Information Assurance Management System Hacking
2
TCOM 59902 Hacking Windows 95/98 Win 9x was not designed to be secure…like NT was…well 4 categories of remote exploitation –Direct connect to shared resource –Backdoor server daemons –Exploit known server application vulnerabilities –Denial of service
3
TCOM 59903 Hacking Windows 95/98 Note that three of these require some misconfiguration or poor judgement on the part of the sysadmin or user Can be easily fixed...
4
TCOM 59904 Hacking Windows NT The Administrator Can’t go anywhere if your not… Passwords…Manual guessing –Easiest password possible…no password! –Something easy –Popular software default passwords
5
TCOM 59905 Hacking Windows NT Automated guessing –Legion... –Can scan multiple class C IP ranges for Windows shares and has a manual dictionary attack tool. –NAT NetBIOS Auditing Tool does one at a time
6
TCOM 59906 Hacking Windows NT –Network password exchange –L0phtcrack - password files SMB Packet Capture bypasses that need - grabs them on the fly by listening to local network segment Password Countermeasures?
7
TCOM 59907 What to Do? Block access to TCP and UDP ports 135-139 Enable TCP/IP security Set Restrict Anonymous key in Registry
8
TCOM 59908 What to Do? Remove Everyone from the Access This Computer in user rights Apply the Service Packs and hotfixes
9
TCOM 59909 What to Do? Strong Passwords! And enforce it! Rename the Administrator account…time, time, time Disable Guest
10
TCOM 599010 What to Do? Admin passwords must be the strongest…and change them regularly No Domain Admin credentials on stand-alone machines
11
TCOM 599011 What to Do? Install passprop from NTRK to enable account lockout for Administrators Install SYSKEY enhanced encryption for the SAM…time, time, time
12
TCOM 599012 What to Do? Enable auditing…then check the logs! Weekly or use automated log analysis tools Verify Registry access permissions are secure
13
TCOM 599013 What to Do? Set the Hidden Registry value on sensitive servers…removes the host from browse lists Don’t run unnecessary services and avoid those that run in the security context of a user
14
TCOM 599014 What to Do? Understand how to configure applications securely or don’t run them! Educate your users on sensitivity of passwords
15
TCOM 599015 What to Do? Migrate to switched architectures…harder to eavesdrop then shared infrastructures Keep current with security mailing lists
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.