Active Directory - ECE Users Pages
Download
Report
Transcript Active Directory - ECE Users Pages
ECE 4112
Internetwork
Security Project
Hacking a Corporate Network
Putting it all together
Drew Conner
Rachel Moorehead
Group 9
Home
Background
Background
Objective
Corporate
Qualifications
Network
Education
Attacks
Employment
- To the DMZ
Skills
- To the DC
Motivation: Prepare for a real life corporate
experience
Microsoft has 66 percent market share in the
server OS arena, Linux has 20 percent and UNIX
has 8 percent, with all others (e.g., NetWare,
Macintosh) accounting for 6 percent.
Market Share in Server OS Arena
in 2004
Defenses
Windows
Linux
Unix
Other
Home
Background
Step-by-Step Approach
Objective
Corporate
Qualifications
Network
Education
Attacks
Employment
- To the DMZ
Skills
- To the DC
Defenses
“[There is a] need for a more layered defense strategy
that provides extensive internal network visibility.” ISS
The number of attempted attacks every day for some
of the large web hosting farms range from hundreds of
thousands to even millions.
High risk vulnerabilities are commonplace in corporate
networks. Respondents found a number of risky
vulnerabilities on their networks during 2005.
28% found unauthorized reconnaissance
23% found unauthorized personnel with root or
administrator access
17% found suspicious connections to critical
applications and databases on their networks
Home
Manufacturing
Background
Project
Problems
Description
Objective
Lean Principles
Corporate
Qualifications
Network
Technical Details
Lean Benefits
- Education
Microcontroller
- Database
Attacks
Employment
Why Lean?
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
Corporate Network
Home
Manufacturing
Background
Project
Problems
Description
Objective
Attacks to the DMZ
Attacking the Web Server
Lean Principles
Corporate
Qualifications
Use MS SQL Exploits
Technical Details
Exploit xp_cmdshell service
Lean Benefits
- Education
Microcontroller
Attacks
Load our “warez” on the machine using TFTP
- Employment
To
DMZ
Whythe
Lean?
Activate NetCat to open a connection
- Database
-Problems
To the DC
Faced
Skills
New Reconnaissance Tools:
PWDump - Get password hashes
Market
& Cost
Defenses
Analysis
Future Work
Acknowledgements
Ophcrack - Crack hashes
Home
Background
Project
Description
Objective
Corporate
Qualifications
Network
Technical Details
- Education
Microcontroller
- Database
Attacks
Employment
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
Attacks to the DC
Attacking the MS Active Directory
Reroute traffic
Exploit Remote Desktop
New Reconnaissance Tools:
Active Directory Domain Listing
netsh
Home
Manufacturing
Background
Project
Defenses
Problems
Description
Objective
Lean Principles
Corporate
Qualifications
Network
Technical Details
Lean Benefits
- Education
Microcontroller
- Database
Attacks
Employment
Why Lean?
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
Web Server
Disable xp_cmdshell
Run SQL Server as a restricted
user
Access databases as a restricted
user
Restrict use to services like TFTP
Active Directory
Harden Administrator account and
password
Review what services such a
Remote Desktop that should be
disabled
Home
Manufacturing
Background
Project
Problems
Description
Objective
Questions
Lean Principles
Corporate
Qualifications
Network
Technical Details
Lean Benefits
- Education
Microcontroller
- Database
Attacks
Employment
Why Lean?
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
“Annual Internal Threat Report Reveals Attacks Against Corporate
Networks Unrelenting.” ISS. 2005.
Dido, Laura. “Application Infrastructure & Software Platforms.” The
Yankee Group. April 2004.
Johansson, J. “Protect Your Windows Network: From Perimeter to
Data.” Addison-Wesley Professional. 2005.