Sie sind auf Seite 1von 24

Hardening Internal Systems and Services

Harden Operating Systems


Harden Directory Services
Harden DHCP Servers
Harden File and Print Servers

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 1


System Vulnerabilities

Unique vulnerabilities for:


Different operating systems
Different vendors
Client and server systems
Vendors try to correct; attackers try to exploit
Security professionals must stay current

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 2


System Vulnerability Categories

Buffer overflows
Service exploits
Default protocols
Known accounts and passwords
Built-in applications
Physical access
Remote administration
File access methods

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 3


Hardening

A hardened OS:
Have been configured to protect against software & hardware
attack by Security policy
Sample OS Security Policy
The Latest Patches
Strong password
The Latest Application Patch
Anti Virus Software
Disable or delete unnecessary accounts (guest,)
Restricted access permission to resources
Control user interaction with the system
Warning messages & banner
Audit policy to track access to resources
Locked room to physically to secure servers & other devices
Backup Strategies

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 4


A Security Baseline

A Security Baselines is a collection of security configuration setting


that are to be applied to a particular system in enterprise. I will ounline
a minimum security configuration to can against attacks.

Use Security Baselines to Analyze Security setting on the system


(MBSA)
Windows OS
IIS
SQL server
IE,Outlook, office

LAB Using MBSA

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 5


System Updates

Patches
Supplemental code
Hotfixes
Patches to address specific flaws
Rollups
Cumulative group of patches & hotfixes
Service Packs
Comprehensive updates with new features

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 6


Windows Security Policies

Policies set centrally

Configuration
settings

Security Settings node


in policy object

LAB: Activity 2-3


Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 7
Windows Auditing

1. Configure audit policy 3


2. Set auditing on objects
3. Monitor security log LAB: Activity 2-4
Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 8
Service, NLM, and Daemon Vulnerabilities

NLM Daemon

Points of entry for attackers


Target of exploits
Disable unneeded processes
Test before deploying

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 9


Security Templates

Apply template
to a system

Predefined
settings

Templates
based on role

LAB: Activity 2-5


Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 10
Hardening Operating Systems

Balance protection with user access needs


Follow hardening guidelines
Requirements will vary

LAB: Activity 2-6,2-7

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 11


A Directory Service

Authentication

Centralized
administration

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 12


Microsoft Active Directory

Domain controller

Active Directory

Domain member

A Directory service is a network service that store information about all


objects In the Network: users, group,server,client, printers. Users use DS
to access Network resource though access ACLs on Object.

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 13


LDAP

LDAP client

Directory query

LDAP server LDAP client

Stores directory
Directory query
data

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 14


Directory Service Vulnerabilities

Active Directory vulnerabilities


Compatibility access
Default permissions
Null sessions
NTLM protocol

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 15


Hardening Directory Services

Balance database security with accessibility


Follow hardening guidelines
Requirements will vary

LAB: Activity 2-9

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 16


DHCP

192.168.100.151 192.168.100.150

192.168.100.152

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 17


DHCP Vulnerabilities

Spoofing
Buffer overflows
Scope modification
Rogue servers
Remote clients

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 18


DHCP Hardening

Prevent unauthorized access while providing services


Follow hardening guidelines
Requirements will vary

LAB: Activity 2-10

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 19


File and Print Server Vulnerabilities

Administrative shares
Insecure file systems
Lack of redundancy
Man-in-the-middle
Default file security
Physical disk security
Physical printer security

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 20


The SMB Process

1
SMB
Connection request

2
SMB
Data request
or print commands

3
SMB
Data
Print results

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 21


SMB Signing

Session fails
if signing not supported

Client signs packets


if signing supported

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 22


Hardening File and Print Servers

Prevent unauthorized access and protect data;


keep services available
Follow hardening guidelines
Requirements will vary

LAB: Activity 2-11

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 23


Reflective Questions

1. Does your organization stay current with all the latest operating
system patches? Why or why not?
2. Which operating system do you think is most secure: Windows
Server 2003, NetWare, or Sun Solaris? Why?

Copyright 2005 Element K Content LLC. All rights reserved. OV 3 - 24

Das könnte Ihnen auch gefallen