Active Directory - ECE Users Pages

Download Report

Transcript Active Directory - ECE Users Pages

ECE 4112
Internetwork
Security Project
Hacking a Corporate Network
Putting it all together
Drew Conner
Rachel Moorehead
Group 9
Home
Background
Background
Objective
Corporate
Qualifications
Network
Education
Attacks
Employment
- To the DMZ
Skills
- To the DC
 Motivation: Prepare for a real life corporate
experience
 Microsoft has 66 percent market share in the
server OS arena, Linux has 20 percent and UNIX
has 8 percent, with all others (e.g., NetWare,
Macintosh) accounting for 6 percent.
Market Share in Server OS Arena
in 2004
Defenses
Windows
Linux
Unix
Other
Home
Background
Step-by-Step Approach
Objective
Corporate
Qualifications
Network
Education
Attacks
Employment
- To the DMZ
Skills
- To the DC
Defenses
 “[There is a] need for a more layered defense strategy
that provides extensive internal network visibility.” ISS
 The number of attempted attacks every day for some
of the large web hosting farms range from hundreds of
thousands to even millions.
 High risk vulnerabilities are commonplace in corporate
networks. Respondents found a number of risky
vulnerabilities on their networks during 2005.
 28% found unauthorized reconnaissance
 23% found unauthorized personnel with root or
administrator access
 17% found suspicious connections to critical
applications and databases on their networks
Home
Manufacturing
Background
Project
Problems
Description
Objective
Lean Principles
Corporate
Qualifications
Network
Technical Details
Lean Benefits
- Education
Microcontroller
- Database
Attacks
Employment
Why Lean?
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
Corporate Network
Home
Manufacturing
Background
Project
Problems
Description
Objective
Attacks to the DMZ
 Attacking the Web Server
Lean Principles
Corporate
Qualifications
 Use MS SQL Exploits
Technical Details
 Exploit xp_cmdshell service
Lean Benefits
- Education
Microcontroller
Attacks
 Load our “warez” on the machine using TFTP
- Employment
To
DMZ
Whythe
Lean?
 Activate NetCat to open a connection
- Database
-Problems
To the DC
Faced
Skills
 New Reconnaissance Tools:
 PWDump - Get password hashes
Market
& Cost
Defenses
Analysis
Future Work
Acknowledgements
 Ophcrack - Crack hashes
Home
Background
Project
Description
Objective
Corporate
Qualifications
Network
Technical Details
- Education
Microcontroller
- Database
Attacks
Employment
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
Attacks to the DC
 Attacking the MS Active Directory
 Reroute traffic
 Exploit Remote Desktop
 New Reconnaissance Tools:
 Active Directory Domain Listing
 netsh
Home
Manufacturing
Background
Project
Defenses
Problems
Description
Objective
Lean Principles
Corporate
Qualifications
Network
Technical Details
Lean Benefits
- Education
Microcontroller
- Database
Attacks
Employment
Why Lean?
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
 Web Server
 Disable xp_cmdshell
 Run SQL Server as a restricted
user
 Access databases as a restricted
user
 Restrict use to services like TFTP
 Active Directory
 Harden Administrator account and
password
 Review what services such a
Remote Desktop that should be
disabled
Home
Manufacturing
Background
Project
Problems
Description
Objective
Questions
Lean Principles
Corporate
Qualifications
Network
Technical Details
Lean Benefits
- Education
Microcontroller
- Database
Attacks
Employment
Why Lean?
- To the DMZ
Problems
Skills Faced
- To the DC
Market & Cost
Analysis
Defenses
Future Work
Acknowledgements
“Annual Internal Threat Report Reveals Attacks Against Corporate
Networks Unrelenting.” ISS. 2005.
Dido, Laura. “Application Infrastructure & Software Platforms.” The
Yankee Group. April 2004.
Johansson, J. “Protect Your Windows Network: From Perimeter to
Data.” Addison-Wesley Professional. 2005.