SecuringWindowsNetworksSecurityAdviceFromTheFrontLinePresentedbyRobertHensing–PSSSecurityIncidentResponseSpecialist微快车微信营销RevealingHackerPersonasTopSecurityMistakesEveryoneSeemsToMakeSecuringWindowsNetworksStayingSecureSecureWindowsInitiativeSecurityImprovementsinXPServicePack2RevealingHackerPersonasOverview–RevealingHackersPersonasAutomatedvs.TargetedAttacksRevealingHackerPersonasLameSkilledSophisticatedWhyYOUWereSelectedandHowYouGot0wn3dHackerPersonasAutomatedAttacks“Spreaders”or“Scan’nSploitTools”or“auto-rooters”WormsThatDropBotsorTrojansTargetedAttacks0-dayExploitsCustomAttacksthatExploitWeaknessofYourInternetPresenceHackerPersonasLame-~75%ofallintrusionsMotive:WantsyourstorageandbandwidthMethod:Useofspreaders,bots,wellknownexploitsAbilities:LimitedhighlevellanguageabilityPayload:UsuallyFTPservers,backdoorsdisguisedasa‘clever’servicename“TCP/IP”serviceor“SystemSecurity”service“MicrosoftISAServerCommonFiles”serviceHackerPersonasSkilled-~24%ofallintrusions?Motive:Wantstoexploreyournetworkanduseyourstorageandbandwidth,wantstoavoiddiscoveryasmuchaspossible.Method:CustomizedintrusionbasedonidentifiedvulnerabilitiesformultipleoperatingsystemsorapplicationsAbilities:AdvancedHLL,someASMPayload:FTPservers,keyloggers,backdoors,sniffers,passworddumpersHackerPersonasSophisticated-1%ofallintrusions?Motive:Wantsyourmoneyoryoursecret/confidentialdataMethod:Cancustomizeintrusionbasedonanynumberofidentifiedvulnerabilitiesforavarietyofoperatingsystemsandapplications,possiblyusing0-dayexploitsAbilities:AdvancedHLL,AdvancedASMPayload:Rootkits,asinglebackdoorDLL,extortionletter!HackerPersonasWhyyouwereselectedandhowyougot0wn3d...Oddsaregreatyouwere0wn3dbyalamerYouwereeasilyidentifiedasaWindowshostthroughasimpleport-scan(nofirewall)Youareonabigfatpipe(possiblyhosted)YouhaveweakpasswordsormissingsecuritypatchesduetomissingorineffectivesecuritypolicyDemonstrationWindowsRootkit–HackerDefenderTopSecurityMistakesEveryoneSeemsToMakeTopSecurityMistakesWeakornon-existentpasswordpolicyNoauditpolicySporadicsecuritypatchpolicyPatchingtheOS,butnottheappsWeakornon-existentfirewallpolicyNoegressfilteringNoknowledgeofsecurelybuildinganewboxwhichleadstoHacked?Rebuild!HackedAgain!?HowToEndTheCycleofViolenceInstallfromslipstreamedsourceDon’thaveone?Makeone!Patchorenableahostbasedfirewall(orboth)andthenconnecttothenetworkDon’tusethepreviousadminpasswordIncludingtheSQLSApasswordDon’tsharelocaladminpasswordsacrossOSinstallationsLeadstoexploitonce,runeverywherePatchtheapplications(SQL,IIS,Exchangeetc.)SecuringWindowsNetworksOverview–SecuringWindowsNetworksSystemAdministratorPersonasAnexampleofwhatnottodoThreats&Countermeasures–PruningTheLowHangingFruitSystemAdminPersonasDefaultSkilledSophisticatedSystemAdminPersonasDefaultPutsserversrightontheInternetwithnofirewallRunsacoupleservicepacksbehind(N-2)anddoesn’tknowhowtokeepuptodatewithsecuritypatchesNopasswordpolicyNoauditpolicyAlldefaultconfigurationsandsettings(alldefaults,allthetime)SystemAdminPersonasSkilledUsesInternetIP’s,buthasrouterACL’sLatestOSSP,allOScriticalupdates,hasn’tpatchedtheapplicationsinawhileifatall6characterpasswordswithaccountlockoutsOnlyauditslogoneventsandmonitorsforaccountlockoutsbycheckingeventlogsperiodicallySuspiciousofdefaultsettingsPerformedsomeOShardeningbyhand–didn’thardentheapplicationsthoughSystemAdminPersonasSophisticatedUsesafirewallwithNATandingress/egressfilteringUsesanIDS/IPSintheDMZnetworkEnsurescriticalsecuritypatchestestedanddeployedin24hourswithrollbackplan12characterpasswords,notsharedanywhere,noaccountlockout,mayuse2-factorauthNAuditseverything,archivesauditlogsdailyHardenedOSusingsecuritytemplates/grouppolicy,hardenedapplicationsWhatNotToDo...ConfigureyoursystemwithanInternetroutableIPaddressRunmultipleapplications/servicesononeboxActiveDirectory,IIS,SQL,Exchange,PCAnywhere,3rdpartysoftwareAvoidinstallingpatchesDon’thaveapasswordpolicyWhataretheoddsthatsomeonewouldguess‘666’ismyadminpassword?Ifyoudothis,here’swhatthehackerssee...Threats–LowHangingFruitOverviewNULLSessionEnumerationPassword/AccountLockoutAttacksPasswordHashAttacksRemoteCodeExecutionVulnerabilitiesPhysicalAttacksUnauthorizedNetworkAccessTheVPN“firewallbypass”ServerThreat-NULLSessionEnumerationUnderstandingthe‘NULL’userNetworkconnection,usuallyusingNetBIOSTCP139inwhichnocredentialshavebeenpassed.Networktokengetscreatedontheserverfortheclient,‘Everyone’SIDgetsaddedtothetokenTokencannowenumeratesensitiveinformationusingtheNet*API’sthe‘Everyone’SIDhaspermissionsto!CountermeasuresRestrictAnonymous=2BlockaccesstoTCP139/445StopserverserviceThreat–PasswordAttacks/AccountLockoutAttacksAnyservicesthatexposesauthNprotocolsareatriskforpasswordguessingattacksNetBIOS,SMB,RDP,IIS,FTPetc.CountermeasuresUsestrongpasswordsinsteadofanaccountlockoutpolicy(whichonlyprotectsweakpasswords)Educateadministratorsandusersonhowtocreatestrongpasswords.Blockaccesstoportsthatallowau