Investigating PowerShell Attacks
|
|
|
- Silvia Wells
- 9 years ago
- Views:
Transcription
1 Investigating PowerShell Attacks Matt Hastings October 7, 2014 Background Case Study Attacker Client Victim VPN WinRM, SMB, NetBIOS Victim workstations, servers Fortune 100 organization Compromised for > 3 years Active Directory Authenticated access to corporate VPN Command-and-control via Scheduled tasks Local execution of PowerShell scripts PowerShell Remoting 2
2 Why PowerShell? It can do almost anything Execute commands Download files from the internet Reflectively load / inject code Interface with Win32 API Enumerate files Interact with the registry Interact with services Examine processes Retrieve event logs Access.NET framework 3 PowerShell Attack Tools PowerSploit Reconnaissance Code execution DLL injection Credential harvesting Reverse engineering Nishang Posh-SecMod Veil-PowerView Metasploit More to come 4
3 PowerShell Malware in the Wild 5 Investigation Methodology WinRM PowerShell Remoting evil.ps1 Local PowerShell script backdoor.ps1 Persistent PowerShell Registry File System Event Logs Memory Network Traffic Sources of Evidence 6
4 Attacker Assumptions Has admin (local or domain) on target system Has network access to needed ports on target system Can use other remote command execution methods to: Enable execution of unsigned PS scripts Enable PS remoting 7 Version Reference Default (SP1) Default (R2 SP1) Requires WMF 3.0 Update Requires WMF 3.0 Update Default Requires WMF 4.0 Update Requires WMF 4.0 Update Requires WMF 4.0 Update Default Default Default (R2) 8
5 MEMORY ANALYSIS 9 Memory Analysis Scenario: Attacker interacts with target host through PowerShell remoting What s left in memory on the accessed system? How can you find it? How long does it persist? 10
6 WinRM Process Hierarchy Invoke-Command {c:\evil.exe} svchost.exe (DcomLaunch) Client Invoke-Command {Get-ChildItem C:\} Invoke-Mimikatz.ps1 -DumpCreds ComputerName victim" wsmprovhost.exe evil.exe wsmprovhost.exe {PS code} Victim 11 Remnants in Memory svchost.exe (DcomLaunch) Terminate at end of session wsmprovhost.exe wsmprovhost.exe evil.exe Cmd history Cmd history {PS code} Remnants of WinRM SOAP persist svchost.exe (WinRM) Kernel 12
7 How Long Will Evidence Remain? wsmprovhost.exe svchost.exe (WinRM) Kernel Memory Pagefile Evidence Best source of command history, output Fragments of remoting I/O Fragments of remoting I/O Fragments of remoting I/O Retention Single remoting session Varies with # of remoting sessions Varies with memory utilization Varies with memory utilization Max Lifetime End of remoting session Reboot Reboot Varies may persist beyond reboot 13 Example Simple Command echo teststring_pssession > c:\testoutput_possession.txt SOAP remnants in WinRM memory after receiving command 14
8 Example Remote Invoke-Mimikatz WinRM service memory on target host after Invoke-Mimikatz.ps1 executed remotely 15 Example Encoded Command Invoke-Command -Computername Cred win-jacr88jtqv5\administrator {echo testingencodedstring > c:\out.txt}" powershell.exe enc SQBuAHYAbwBrAGUALQBDAG8AbQBtAGEAbgBkACAALQBDAG8AbQBwAHUAdABlAHIAbgBhAG0AZQAgADEAOQ AyAC4AMQA2ADgALgAxADEANAAuADEAMwAzACAALQBDAHIAZQBkACAAdwBpAG4ALQBqAGEAYwByADgAOABq AHQAcQB2ADUAXABhAGQAbQBpAG4AaQBzAHQAcgBhAHQAbwByACAAewBlAGMAaABvACAAdABAHMAdABpAG4 AZwBFAG4AYwBvAGQAZQBkAFMAdAByAGkAbgBnACAAPgAgAGMAOgBcAG8AdQB0AC4AdAB4AHQAfQA= WinRM service memory on target host 16
9 What to Look For? WSMan & MS PSRP Syntax /wsman.xsd <rsp:command> <rsp:commandline> <rsp:arguments> <S N="Cmd > Known attacker filenames View context around hits Yes, this is painful <rsp:commandresponse><rsp:commandid>""xmlns:r sp=" /windows/shell"""c80927b1-c741-4e99-9f97- CBA80F23E595</a:MessageID><w:Locale xml:lang="en-us" s:mustunderstand="false" /><p:datalocale xml:lang="en-us" s:mustunderstand="false" /><p:sessionid"/w:operationtimeout></s:header ><s:body><rsp:commandline xmlns:rsp=" wsman/1/windows/shell" CommandId="9A153F8A- AA3C AC186539F107"><rsp:Command>prompt""/rsp:Comma nd><rsp:arguments>aaaaaaaaafkaaaaaaaaaaamaaaa jagaaaayqagc2yc+edbrbtlq08prufn+rij8vmjyqzeag AKwYZTnxB++7vzxPYmogUmVmSWQ9IjAiPjxNUz48T2JqI E49IlBvd2VyU2hlbGwiIFJlZklkPSIxIj48TVM+PE9iai BOPSJDbWRzIiBSZWZJZD0iMiI+PFROIFJlZklkPSIwIj4 8VD5TeXN0ZW0uQ29sbG Memory Analysis Summary Timing is everything Challenging to recover evidence Many variables System uptime Memory utilization Volume of WinRM activity 18
10 EVENT LOGS 19 Event Logs Scenario: Attacker interacts with target host through local PowerShell script execution or PowerShell remoting Which event logs capture activity? Level of logging detail? Differences between PowerShell 2.0 and 3.0? 20
11 PowerShell Event Logs Application Logs Windows PowerShell.evtx Microsoft-Windows- PowerShell/Operational.evtx Microsoft-Windows- WinRM/Operational.evtx Analytic Logs Microsoft-Windows- PowerShell/Analytic.etl Microsoft-Windows- WinRM/Analytic.etl 21 Local PowerShell Execution PowerShell EID 400: Engine state is changed from None to Available. HostName=ConsoleHost EID 403: Engine state is changed from Available to Stopped. HostName=ConsoleHost Start & stop times of PowerShell session 22
12 Local PowerShell Execution EID 40961: PowerShell console is starting up Start time of PowerShell session PowerShell Operational** EID 4100: Error Message = File C:\temp\test.ps1 cannot be loaded because running scripts is disabled on this system ** Events exclusive to PowerShell 3.0 or greater Error provides path to PowerShell script 23 Local PowerShell Execution PowerShell Analytic** EID 7937: Command test.ps1 is Started. EID 7937: Command Write-Output is Started. EID 7937: Command dropper.exe is Started ** Log disabled by default. Events exclusive to PowerShell 3.0 or greater Executed cmdlets, scripts, or commands (no arguments) 24
13 Remoting PowerShell EID 6: Creating WSMan Session. The connection string is: /wsman?PSVersion=2.0 Start of remoting session (client host) PowerShell EID 400: Engine state is changed from None to Available. HostName=ServerRemoteHost EID 403: Engine state is changed from Available to Stopped. HostName=ServerRemoteHost Start & stop of remoting session (accessed host) 25 Remoting (Accessed Host) EID 169: User CORP\MattH authenticated successfully using NTLM Who connected via remoting WinRM Operational EID 81: Processing client request for operation CreateShell EID 134: Sending response for operation DeleteShell Timeframe of remoting activity 26
14 Remoting (Accessed Host) EID 32850: Request Creating a server remote session. UserName: CORP\JohnD Who connected via remoting PowerShell Analytic EID 32867: Received remoting fragment [ ] Payload Length: 752 Payload Data: 0x D64FA51E7C DC[ ] EID 32868: Sent remoting fragment [ ] Payload Length: 202 Payload Data: 0xEFBBBF3C4F626A D E3[ ] Encoded contents of remoting I/O 27 PS Analytic Log: Encoded I/O Invoke-Command {Get-ChildItem C:\} 28
15 PS Analytic Log: Decoded Input Invoke-Command {Get-ChildItem C:\} 29 PS Analytic Log: Decoded Output Invoke-Command {Get-ChildItem C:\} 30
16 Logging via PowerShell Profiles %windir%\system32\windowspowershell\v1.0\profile.ps1 Add code to global profile Loads with each local PS session Start-Transcript cmdlet Overwrite default prompt function Limitations Will not log remoting activity Can launch PowerShell without loading profiles 31 Logging via AppLocker Set Audit or Enforce script rules Captures user, script path 32
17 PowerShell 3.0: Module Logging Solves (almost) all our logging problems! Computer Configuration Administrative Templates Windows Components Windows PowerShell Turn on Module Logging 33 Module Logging Example: File Listing Get-ChildItem c:\temp -Filter *.txt -Recurse Select-String password Microsoft-Windows-PowerShell/Operational (EID 4103) ParameterBinding(Get-ChildItem): name="filter"; value="*.txt" ParameterBinding(Get-ChildItem): name="recurse"; value="true" ParameterBinding(Get-ChildItem): name="path"; value="c:\temp" ParameterBinding(Select-String): name="pattern"; value="password" ParameterBinding(Select-String): name="inputobject"; value="creds.txt"... Command Name = Get-ChildItem User = CORP\MHastings Logged upon command execution ParameterBinding(Out-Default): name="inputobject"; value="c:\temp\creds.txt:2:password: secret" ParameterBinding(Out-Default): name="inputobject"; value="c:\temp\creds.txt:5:password: test" Logged upon command output 34
18 Module Logging Example: Invoke- Mimikatz Invoke-Mimikatz.ps1 via remoting Detailed percommand logging 35 Module Logging Example: Invoke- Mimikatz Mimikatz output in event log 36
19 PERSISTENCE 37 PowerShell Persistence Scenario: Attacker configures system to load malicious PowerShell code upon startup or user logon What are common PowerShell persistence mechanisms? How to find them? 38
20 Common Techniques Registry autorun keys Scheduled tasks User startup folders Easy to detect Autorun review Registry timeline analysis File system timeline analysis Event log review At1.job At1.job At1.job 39 Persistence via WMI Use WMI to automatically launch PowerShell upon a common event Namespace: root\subscription Set-WmiInstance EventFilter Filter name, event query Set-WmiInstance CommandLineEventConsumer Consumer name, path to powershell.exe Set-WmiInstance FilterToConsumerBinding Filter name, consumer name 40
21 Event Filters Query that causes the consumer to trigger SELECT * FROM InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_PerfFormattedData_PerfOS_System' AND TargetInstance.SystemUpTime >= 240 AND TargetInstance.SystemUpTime < 325 Run within minutes of startup SELECT * FROM InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA 'Win32_LocalTime' AND TargetInstance.Hour = 12 AND TargetInstance.Minute = 00 GROUP WITHIN 60 Run at 12:00 41 Event Consumers Launch PowerShell.exe when triggered by filter Where does the evil PS code load from? sal a New-Object;iex(a IO.StreamReader((a IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64 String('7L0HYBxJliUmL23Ke39K9UrX4HShCIBgEyTYkEAQ7MGIzeaS7B1pRyMpqyq BymVWZV1mFkDM7Z nvvvfe6O51OJ/ff/z9cZmQBbPbOStrJniGAqsgfP3 58Hz8ivlsXbb795bpdrdv0o2/nZVml363qcvbR/xMAAP//'),[IO.Compression.Co mpressionmode]::decompress)),[text.encoding]::ascii)).readtoend() Stored in user or system-wide profile.ps1 Set-WmiInstance -Namespace "root\subscription" -Class 'CommandLineEventConsumer' name='totallylegitwmi';commandlinetemplate="$($env:systemroot)\syst em32\windowspowershell\v1.0\powershell.exe - NonInteractive";RunInteractively='false'} Added to Consumer Command-Line Arguments (length limit, code must be base64 d) 42
22 Enumerating WMI Objects with PowerShell Get-WMIObject Namespace root\subscription -Class EventFilter Get-WMIObject -Namespace root\subscription -Class EventConsumer Get-WMIObject -Namespace root\subscription -Class FilterToConsumerBinding 43 PS WMI Evidence: File System WBEM repository files changed (common) Strings in objects.data Global or per-user profile.ps1 changed (if used to store code) sal a New-Object;iex(a IO.StreamReader((a IO.Compression.DeflateStream([IO.MemoryStr eam][convert]::frombase64string('7l0hybxjl iuml23ke39k9urx4hshcibgeytykea... 44
23 PS WMI Evidence: Registry Key Value Data HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\ ESS\//./root/CIMV2\Win32ClockProvider Key Last Modified 06/04/14 01:30:03 UTC [N/A] [N/A] Created only when setting a time-based WMI filter (many other types of triggers may be used) 45 PS WMI Evidence: Other Sources SysInternals AutoRuns v12 Memory: WMI filter & consumer names svchost.exe (WinMgmt service) WmiPrvse.exe Event logs: WMI Trace 46
24 CONCLUSIONS 47 Other Sources of Evidence Refer to whitepaper Prefetch for PowerShell.exe Local execution only Scripts in Accessed File list Registry ExecutionPolicy setting Network traffic analysis (WinRM) 5985 (HTTP) / 5986 (HTTPS) Payload always encrypted Identify anomalous netflows SysInternals Sysmon Command argument auditing Local execution only POWERSHELL.EXE-59FC8F3D.pf 48
25 Lessons Learned Upgrade and enable Module Logging if possible Baseline legitimate PowerShell usage ExecutionPolicy setting Script naming conventions, paths Remoting enabled? Which users? Common source / destination systems Recognize artifacts of anomalous usage 49 Acknowledgements Matt Graeber Joseph Bialek Chris Campbell Lee Holmes David Wyatt David Kennedy Josh Kelley All the other PowerShell authors, hackers, and researchers! 50
26 Questions? 51
Investigating PowerShell Attacks
Investigating PowerShell Attacks Ryan Kazanciyan, Matt Hastings Black Hat USA 2014 TABLE OF CONTENTS Introduction and Prior Research... 2 Assumptions... 3 Testing Methodology... 4 Findings and Sources
WHITE PAPER. INVESTIGATING POWERSHELL ATTACKS Black Hat USA 2014. Authors: Ryan Kazanciyan, Matt Hastings SECURITY REIMAGINED
WHITE PAPER INVESTIGATING POWERSHELL ATTACKS Black Hat USA 2014 Authors: Ryan Kazanciyan, Matt Hastings SECURITY REIMAGINED CONTENTS Introduction and Prior Research...3 Assumptions...4 Testing Methodology...5
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asynchronous, and Fileless Backdoor. Matt Graeber
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asynchronous, and Fileless Backdoor Matt Graeber Disclaimer While the code and techniques discussed today are offensive in nature,
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
Microsoft Windows PowerShell v2 For Administrators
Course 50414B: Microsoft Windows PowerShell v2 For Administrators Course Details Course Outline Module 1: Introduction to PowerShell the Basics This module explains how to install and configure PowerShell.
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft Windows using Eventing Collection Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event
WolfTech Active Directory: Diagnostic Tools
WolfTech Active Directory: Diagnostic Tools April 6th, 2012 2-4pm Daniels 201 http://activedirectory.ncsu.edu What we are going to cover... Problem Reporting Problem Steps Recorder Application Diagnostics
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and Fileless Backdoor
Abusing Windows Management Instrumentation (WMI) to Build a Persistent, Asyncronous, and Fileless Backdoor Matt Graeber Black Hat 2015 Introduction As technology is introduced and subsequently deprecated
ILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.
OPAS Prerequisites This document contains the prerequisites and requirements for setting up OPAS. Prepared By: Luke Swords Principal Consultant 24/06/2015 Version 1.0 Contact Information Infront Consulting
Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure
Server Manager Diagnostics Page 653. Information. Audit Success. Audit Failure The view shows the total number of events in the last hour, 24 hours, 7 days, and the total. Each of these nodes can be expanded
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers Description: Days: 5 Prerequisites: This five-day instructor-led course provides students with the knowledge and skills that
PowerShell Remoting Configuration
PowerShell Remoting Configuration This document will explain the proposed steps to configure PowerShell Remoting. Because there are two methods of configuring Remoting (HTTP and HTTPS), this document will
Ipswitch Client Installation Guide
IPSWITCH TECHNICAL BRIEF Ipswitch Client Installation Guide In This Document Installing on a Single Computer... 1 Installing to Multiple End User Computers... 5 Silent Install... 5 Active Directory Group
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Windows Server 2008 R2: Server Management and PowerShell V2
Windows Server 2008 R2: Server Management and PowerShell V2 Table of Contents Windows Server 2008 R2: Server Management and PowerShell V2... 1 Exercise 1 Remote Management Using Server Manager... 2 Exercise
A Roadmap for Securing IIS 5.0
This document was grafted together from various Web and other sources by Thomas Jerry Scott for use in his Web and other Security courses. Jerry hopes you find this information helpful in your quest to
PROJECTIONS SUITE. Database Setup Utility (and Prerequisites) Installation and General Instructions. v0.9 draft prepared by David Weinstein
PROJECTIONS SUITE Database Setup Utility (and Prerequisites) Installation and General Instructions v0.9 draft prepared by David Weinstein Introduction These are the instructions for installing, updating,
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for
Acronis Backup & Recovery 10 Server for Windows. Installation Guide
Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent
Web. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
Requirements & Install. Module 2 Single Engine Installation
Requirements & Install Module 2 Single Engine Installation Requirements Requirement Minimum Optimum Processor Intel Core 2 @ 2GHz Dual Processor Xeon 3.0 GHz Memory 2 GB RAM 8 GB RAM Disk Space 2 GB 5GB
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Ad Hoc Transfer Plug-in for Outlook Installation Guide
IPSWITCH TECHNICAL BRIEF Ad Hoc Transfer Plug-in for Outlook Installation Guide In This Document Installing the Ad Hoc Transfer Plug-in for Outlook...1 Silent Install for Ad Hoc Transfer Plug-in for Outlook...3
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
Windows PowerShell Fundamentals
Windows PowerShell Fundamentals Steven Murawski Senior Windows Systems Engineer Microsoft MVP This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy
Windows PowerShell Cookbook
Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
RSA Security Analytics
RSA Security Analytics Event Source Log Configuration Guide Microsoft SQL Server Last Modified: Thursday, July 30, 2015 Event Source Product Information: Vendor: Microsoft Event Source: SQL Server Versions:
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.
MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy Discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy. In this four-day instructor
6419: Configuring, Managing, and Maintaining Server 2008
6419: Configuring, Managing, and Maintaining Server 2008 Course Number: 6419 Category: Technical Duration: 5 days Course Description This five-day instructor-led course combines five days worth of instructor-led
411-Administering Windows Server 2012
411-Administering Windows Server 2012 Course Duration: 5 Days Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
5nine Virtual Firewall 2.1 for Microsoft Hyper-V
KEY POINTS Secure your Hyper-V Virtual Machines & Virtual Servers Control Network Traffic In and Out of Your Virtual Machines & Virtual Servers Restrict Virtual Network Traffic Using Stateful Packet Filtering
Managing Windows Environments with Group Policy
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: [email protected] Web: www.discoveritt.com Managing Windows Environments with Group Policy Course: MS50255C
Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell
Pass-the-Hash II: Admin s Revenge Skip Duckwall & Chris Campbell Do you know who I am? Skip Co-presented PTH talk last year at BH, Derbycon http://passing-the-hash.blogspot.com @passingthehash on twitter
Remote Desktop Reporter Agent Deployment Guide
Remote Desktop Reporter Agent Deployment Guide Table of Contents Overview... 2 Agent Components... 2 Agent Security... 2 Windows Firewall Considerations... 3 Installation Procedure and Configuration Parameters...
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
OneStop Reporting 3.7 Installation Guide. Updated: 2013-01-31
OneStop Reporting 3.7 Installation Guide Updated: 2013-01-31 Copyright OneStop Reporting AS www.onestopreporting.com Table of Contents System Requirements... 1 Obtaining the Software... 2 Obtaining Your
Active Directory Installation on Windows Server 2012
Active Directory Installation on Windows Server 2012 What really active directory is..? Active Directory Domain Services (AD DS) is an extensible and scalable directory service you can use to efficiently
Acronis Backup & Recovery 11
Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want
Receiver Updater for Windows 4.0 and 3.x
Receiver Updater for Windows 4.0 and 3.x 2015-04-12 05:29:34 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver Updater for Windows 4.0 and 3.x...
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2)
Disaster Recovery System Administration Guide for Cisco Unified Contact Center Express Release 8.0(2) This guide provides an overview of the Disaster Recovery System, describes how to use the Disaster
Manage Traps in a VDI Environment. Traps Administrator s Guide. Version 3.3. Copyright 2007-2015 Palo Alto Networks
Manage Traps in a VDI Environment Traps Administrator s Guide Version 3.3 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
365 Services. 1.1 Configuring Access Manager. 1.1.1 Prerequisite. 1.1.2 Adding the Office 365 Metadata. docsys (en) 2 August 2012
1 1Configuring Single Sign-On For Office 365 Services NetIQ Access Manager is compatible with Office 365 and provides single sign on access to Office 365 services. Single sign on access is supported for
Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Partie Serveur 2008. Lab : Implement Group Policy. Create, Edit and Link GPOs. Lab : Explore Group Policy Settings and Features
Partie Serveur 2008 Implement a Group Policy Infrastructure This module explains what Group Policy is, how it works, and how best to implement Group Policy in your organization. Understand Group Policy
Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Why You Need to Detect More Than PtH. Matt Hathaway, Senior Product Manager, Rapid7 Jeff Myers, Lead Software Engineer, Rapid7
Why You Need to Detect More Than PtH Matt Hathaway, Senior Product Manager, Rapid7 Jeff Myers, Lead Software Engineer, Rapid7 Who We Are! Matt Hathaway Senior Product Manager for Rapid7 UserInsight Former
Configuring, Managing and Maintaining Windows Server 2008-based Servers
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers OVERVIEW About this Course This five-day instructor-led course provides students with the knowledge and skills that
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Random Password Manager Enterprise Edition
Random Password Manager Enterprise Edition i Contents Copyright Notice 4 Introduction 1 Overview...1 Performance Notes...1 License Agreement...1 Limited Warranty...3 Background and Goals...3 Product Installation
LAE 5.1. Windows Server Installation Guide. Version 1.0
LAE 5.1 Windows Server Installation Guide Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS THEREOF MAY NOT BE REPRODUCED IN ANY FORM WITHOUT
Microsoft Corporation. Status: Preliminary documentation
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List
Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List Paula Januszkiewicz CQURE: CEO, Penetration Tester CQURE Offices: New York, Dubai, Warsaw MVP: Enterprise Security,
6425C - Windows Server 2008 R2 Active Directory Domain Services
Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Introduction This five-day instructor-led course provides in-depth training on configuring Active Directory Domain Services
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides
Terminal Services Tools and Settings - Terminal Services: %PRODUCT%
Page 1 of 10 Terminal Services Tools and Settings In this section Terminal Services Tools Terminal Services Registry Entries Terminal Services Group Policy Settings Terminal Services WMI Classes Network
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection Sean Metcalf (@PyroTek3) CTO, DAn Solutions sean [@] dansolutions _._com http://dansolutions.com http://www.adsecurity.org ABOUT Chief
HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5
Enterprise Insights Active Directory Integration: Installation and Setup Guide v1.0.5 This guide explains how to install and configure the Active Directory Components provisioned and maintained from the
TARGETPROCESS INSTALLATION GUIDE
TARGETPROCESS INSTALLATION GUIDE v.2.19 Installation Guide This document describes installation of TargetProcess application and common problems with resolutions. 1 PREREQUISITES... 3 SERVER REQUIREMENTS...
Deploying Microsoft Operations Manager with the BIG-IP system and icontrol
Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -
Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201
Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
SQL Server Solutions GETTING STARTED WITH. SQL Safe Backup
SQL Server Solutions GETTING STARTED WITH SQL Safe Backup Purpose of this document Due to its depth and potential for customization, there are often parts of SQL Safe Backup that are overlooked during
Good Morning Wireless! SSID: MSFTOPEN No Username or Password Required
Good Morning Wireless! SSID: MSFTOPEN No Username or Password Required 2 Today s Agenda - 9:00-10:30 - Windows Azure Infrastructure Services - 10:30-10:45 - Break - 10:45-12:00 - Windows Azure Infrastructure
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
DSCompromised: A Windows DSC Attack Framework
DSCompromised: A Windows DSC Attack Framework Black Hat Asia 2016 Matt Hastings, Ryan Kazanciyan Hello! Ryan Kazanciyan Chief Security Architect, Tanium Matt Hastings Security Director, Tanium Backgrounds
Administration Guide. BlackBerry Resource Kit for BlackBerry Enterprise Service 10. Version 10.2
Administration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124107981 Contents Overview: BlackBerry Enterprise Service 10... 8 Overview:
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection Sean Metcalf (@PyroTek3) CTO, DAn Solutions sean [@] dansolutions _._com DAnSolutions.com ADSecurity.org ABOUT Chief Technology Officer
