Download presentation
Presentation is loading. Please wait.
Published bySheila Floyd Modified over 9 years ago
1
Асоциация за информационна сигурност www.iseca.org Мрежова сигурност 1 изборен курс във ФМИ на СУ понеделник, зала 325, ФМИ, 19:00 четвъртък, зала 200, ФМИ, 19:00 Лекция 3.11 :-) Windows
2
Windows General Windows User roles Type of targets Type of attacks Example attacks Attack prevention Hardening Windows
3
Windows general Windows role Windows and the others Patch management Today role of the security
4
User Roles Local System Administrator User Special Roles
5
Type of targets Services Applications Registry Users Permissions Passwords
6
Type of attacks Information gathering Error messages enumerations Programming errors Buffer overflows Format strings Other
7
Type of attacks DoS resource consume Others Misconfiguration Privileges More privileges Not dropped privileges
8
Type of attacks User Lack of security knowledge Misleading Boredom Local attacks On site Password dumping Off site
9
Type of attacks Hiding Root Kits NTFS Registry
10
Example attacks Information gathering Snmpwalk Path disclosure Banner matching Programming errors Code red – IIS /default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN NNNNNNNNNNNNNNNNNNNNNNNN%u9090%u6858%ucbd3%u7801%u909 0%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u9090 %u8190%u00c3%u0003%u8b00%u531b%u53ff%u0078%u0000%u00=a
11
Example attacks SASSER Local Security Authority Subsystem Service - Lsasrv.dll RPC buffer overflow allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file Windows WMF The vulnerability is caused due to an error in the handling of Windows Metafile files (‘.wmf’) containing specially crafted SETABORTPROC ‘Escape’ records. Such records allow arbitrary user-defined function to be executed when the rendering of a WMF file fails.” According to the Windows 3.1 SDK docs, the SETABORTPROC escape was obsoleted and replaced by the function of the same name in Windows 3.1, long before the WMF vulnerability took advantage of it Local privileges escalation attacks
12
Example attacks Microsoft Word document handling buffer overflow A memory corruption vulnerability in Microsoft Word could allow a remote attacker to execute arbitrary code with the privileges of the user running Word.
13
Example attacks DoS TCP/IP Microsoft Windows 2000 empty TCP packet denial of service Microsoft Windows 2000 is vulnerable to a denial of service attack. A remote attacker can send a stream of empty TCP packets to the NetBIOS port (TCP port 139) to consume all available system memory Applications IIS DOS POST /_vti_bin/shtml.dll HTTP/1.0 Host: [32762 '/' characters] Content-length: 22 This will cause the web service to consume 99% of the CPU for about 35 seconds. During this time, no other HTTP requests will be serviced.
14
Example attacks Enumerations Shares Netbios Auditing Tool Accounts @stake LC 5 Other bindview enum enum is a console-based Win32 information enumeration utility. Using null sessions, enum can retrieve userlists, machine lists, sharelists, namelists, group and member lists, password and LSA policy information. enum is also capable of a rudimentary brute force dictionary attack on individual accounts.
15
Example attacks Misconfiguration Registry permissions Files / Directory permissions Privileges Higher privileges than needed
16
Example attacks Hiding Root kits Trojans
17
Attack prevention OS side DEP – Data Execution Prevention Randomization Safe libs Registry tweaks IDS Deep packet inspection Honeypots Updates
18
Hardening Safe coding Best practices Lock tools Education of users Good security polices Password polices Access polices
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.