Analysis of Malicious Security Support Provider DLLs
|
|
|
- Horatio Patrick
- 9 years ago
- Views:
Transcription
1 Analysis of Malicious Security Support Provider DLLs Matt Graeber October 7, 2014 Introduction Matt Graeber FireEye Labs Advanced Reverse Engineering (FLARE) Team Malware Analyst Instructor Past Researcher US Army Red Team 中 文 翻 译 Reformed certification hoarder For fun PowerShell! PowerSploit Twitter 2
2 Goals What are security support providers (SSP) Local security authority (LSA)/SSP architecture SSPs from an attacker s perspective Legitimate SSPs SSP internals Installation Detection Mitigation Obligatory IDA screenshot Obligatory PowerShell screenshot 3 Background A malicious security support provider (SSP) DLL was found recently during a recent IR engagement. Searching for SpLsaModeInitialize a required SSP DLL export, yielded only two unique hits in our internal malware database. The uniqueness of this type of malware warranted additional investigation 4
3 Definitions A security support provider (SSP) a.k.a security package: A user-mode security extension used to perform authentication during a client/server exchange. e.g. schannel (SSL) An authentication package (AP) Used to extend interactive logon authentication e.g. Enable RSA token authentication SSP/AP Can serve the tasks of SSPs and APs. Loaded in lsass. e.g. kerberos and msv1_0 (NTLM) 5 LSA Extensible Architecture The Local Security Authority (LSA) is responsible for nearly all aspects of local security on a system Authenticate and log on users Manage credentials SAM/NTDS/etc. Built-in support for message privacy and integrity LSA is extensible SSP/APs are loaded into LSA (lsass.exe) at boot Custom SSP/APs can either replace or proxy existing providers. 6
4 SSPI Architecture - Legitimate Client App Secur32.dll InitSecurityInterface QuerySecurityPackageInfo AcquireCredentialsHandle InitializeSecurityContext DecryptMessage EncryptMessage LSA kerberos msv1_0 wdigest 7 SSPI Architecture - Malicious Malicious Client App Secur32.dll Named Pipe Shared Memory LSA InitSecurityInterface QuerySecurityPackageInfo AcquireCredentialsHandle InitializeSecurityContext DecryptMessage EncryptMessage kerberos msv1_0 wdigest maliciousssp 8
5 SSP Benefits from an Attacker s Perspective Once installed, your DLL is loaded into lsass.exe! i.e. no need to inject into lsass.exe Not a well-known persistence mechanism Once loaded into lsass, you are handed an officially supported credential capture API. i.e. officially supported, Mimikatz-like functionality without needing Mimikatz 9 Common Legitimate SSPs Microsoft msv1_0.dll kerberos.dll negoexts.dll wsauth.dll 3 rd Party wsauth.dll VMWare Horizon View CTXAUTH.dll Citrix schannel.dll TSpkg.dll msoidssp.dll pku2u.dll etc. phonefactorlsa.dll PhoneFactor 10
6 LSA SSP Initialization Procedure 1. Inform LSA of SSP implemented functions 2. Inform SSP of available LSA support functions 11 SSP Development - Requirements Minimum required functions* 1. SpInitialize 2. SpShutDown 3. SpGetInfo Required Export 12
7 SSP Development - Implementation NTSTATUS NTAPI SpLsaModeInitialize( _In_ ULONG LsaVersion, _Out_ PULONG PackageVersion, _Out_ PSECPKG_FUNCTION_TABLE *pptables, _Out_ PULONG pctables ); Called by LSA when your SSP DLL is loaded. Only required export function Informs LSA of the functions your SSP DLL implements via PSECPKG_FUNCTION_TABLE LSA expects at a minimum, the following in PSECPKG_FUNCTION_TABLE: SpInitialize typedef struct SECPKG_FUNCTION_TABLE {... SpShutDown SpInitializeFn *Initialize; SpGetInfo SpShutdownFn *Shutdown; SpGetInfoFn SpAcceptCredentialsFn SpGetCredentialsFn SpGetUserInfoFn SpAddCredentialsFn SpSetExtendedInformationFn... } SECPKG_FUNCTION_TABLE, *PSECPKG_FUNCTION_TABLE; *GetInfo; *AcceptCredentials; *GetCredentials; *GetUserInfo; *AddCredentials; *SpChangeAccountPasswordFn; 13 SSP Development - Implementation NTSTATUS SpInitialize( _In_ ULONG_PTR PackageId, _In_ PSECPKG_PARAMETERS Parameters, _In_ PLSA_SECPKG_FUNCTION_TABLE FunctionTable ); Called by LSA after SpLsaInitialize Informs your SSP DLL the available LSA functions via PLSA_SECPKG_FUNCTION_TABLE typedef struct _LSA_SECPKG_FUNCTION_TABLE {... PLSA_GET_CREDENTIALS GetCredentials; PLSA_OPEN_SAM_USER OpenSamUser; PLSA_GET_USER_CREDENTIALS GetUserCredentials; PLSA_GET_USER_AUTH_DATA GetUserAuthData; PLSA_UPDATE_PRIMARY_CREDENTIALS UpdateCredentials; PLSA_GET_AUTH_DATA_FOR_USER GetAuthDataForUser; CredReadDomainCredentialsFn *CrediReadDomainCredentials; PLSA_PROTECT_MEMORY LsaProtectMemory; PLSA_PROTECT_MEMORY LsaUnprotectMemory; PLSA_GET_SERVICE_ACCOUNT_PASSWORD GetServiceAccountPassword;... } LSA_SECPKG_FUNCTION_TABLE, *PLSA_SECPKG_FUNCTION_TABLE; 14
8 SSP Development - Implementation NTSTATUS SpShutDown(void); Called at system shutdown Can simply return NULL lsass.exe will crash if this if not implemented 15 SSP Development - Implementation NTSTATUS SpGetInfo(_Out_ PSecPkgInfo PackageInfo); Provides general information about a security package Can return the following info: Name Description Capabilities etc. Must be implemented but it doesn t need to do anything. 16
9 SSP Installation 1.Copy the SSP DLL to %windir%\system32 Note: Because the DLL is loaded into lsass, it must be compiled for the same architecture as lsass.exe 2.Add the file name (without extension) to: HKLM\SYSTEM\CurrentControlSet\Control \Lsa\Security Packages HKLM\SYSTEM\CurrentControlSet\Control \Lsa\OSConfig\Security Packages 3. Optional: Load it into lsass immediately by calling secur32!addsecuritypackage 4. Reboot 17 Malicious SSP PoC mimilib SSP Benjamin Delpy recently added SSP functionality to mimilib.dll. He has yet to document or heavily advertise this functionality. Once installed and loaded into lsass.exe, it captures passwords in plaintext. This is achieved with the SpAcceptCredential callback function. 18
10 Malicious SSP PoC mimilib SSP 19 Malicious SSP PoC mimilib SSP %windir%\system32\kiwissp.log [ :000003e7] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (SYSTEM) [ :000003e4] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (NETWORK SERVICE) [ :000003e4] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (NETWORK SERVICE) [ :000003e7] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (SYSTEM) [ :000003e7] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (SYSTEM) [ :000527ee] [ ] WIN-LOI4CUIDKP1\anonymous (anonymous) badpassword [ : ] [ ] WIN-LOI4CUIDKP1\anonymous (anonymous) badpassword [ :00065d64] [ ] WIN-LOI4CUIDKP1\anonymous (anonymous) badpassword [ :00065d7a] [ ] WIN-LOI4CUIDKP1\anonymous (anonymous) badpassword [ :000003e5] [ ] \ (LOCAL SERVICE) [ :000003e4] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (NETWORK SERVICE) [ :000003e4] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (NETWORK SERVICE) [ :000003e5] [ ] \ (LOCAL SERVICE) [ :000003e4] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (NETWORK SERVICE) [ :000003e4] [ ] WORKGROUP\WIN-LOI4CUIDKP1$ (NETWORK SERVICE) 20
11 Malicious SSP Mitigations Prevention Windows 8.1/Server 2012 R2 running Secure Boot with UEFI: HKLM\SYSTEM\CurrentControlSet\Control\Lsa \RunAsPPL (DWORD) = 1 Makes lsass a protected process. Forces SSP DLLs to be co-signed by Microsoft. With Secure Boot (w/ UEFI) enabled, RunAsPPL is set as a UEFI secure variable and cannot be deleted. 21 Malicious SSP Detection Windows 8.1/Server 2012 R2 only Generate event logs upon loading of an unsigned lsass module: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\LSASS.exe AuditLevel = 8 (REG_DWORD) Reboot When an unsigned SSP is loaded, either of the following events will trigger:
12 Malicious SSP Detection Detection Whitelist legitimate SSP DLLs. Alert when HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Security Packages or HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSConfig\S ecurity Packages is modified to contain an SSP not in the whitelist. Alert on any DLLs that export SpLsaModeInitialize that are not in the whitelist. MIGHT be present under LSA Providers in Sysinternals Autoruns 23 Malicious SSP Mitigations Removal Remove the SSP from the following reg keys: HKLM\SYSTEM\CurrentControlSet\Control\Lsa\Sec urity Packages HKLM\SYSTEM\CurrentControlSet\Control\Lsa\OSC onfig\security Packages Delete the DLL from %windir%\system32 Call secur32!deletesecuritypackage? Oops! MS forgot to implement that function. Reboot 24
13 Malicious SSP Mitigations 25 References Registering SSP/AP DLLs Configuring Additional LSA Protection LSA Mode Initialization Mimikatz PoC SSP 26
14 Merci!!! Thank you Benjamin Delpy for the following: 1. Performing all the original research on malicious SSPs 2. Writing a PoC malicious SSP 3. Writing Mimikatz! <3 4. Patiently and enthusiastically answering all my dumb questions. 27 QUESTIONS? 28
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store
Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store Mike Middleton Justin Prosco Mandiant, A FireEye Company Mike Middleton Principal Consultant Joined
give me the password and I'll rule the world dpapi, what else?
give me the password and I'll rule the world dpapi, what else? who am I? A question I often ask to myself let socials do the job. Francesco Picasso Reality Net System Solutions @dfirfpi blog.digital-forensics.it
mimikatz 2.0 Benjamin DELPY `gentilkiwi`
mimikatz 2.0 Benjamin DELPY `gentilkiwi` Our little story `whoami`, why am I doing this? mimikatz 2.0 & sekurlsa Focus on Windows 8.1 et 2012r2 Kerberos & strong authentication Questions / Answers And
Configuring Authentication for Microsoft Windows
Chapter 4 Configuring Authentication for Microsoft Windows In this chapter: Storing and Transmitting Credentials..............................69 Storing Secrets in Windows......................................83
Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell
Pass-the-Hash II: Admin s Revenge Skip Duckwall & Chris Campbell Do you know who I am? Skip Co-presented PTH talk last year at BH, Derbycon http://passing-the-hash.blogspot.com @passingthehash on twitter
Michael Mayer-Gishyan NSA IT Consulting e.u. @mike_srv02 [email protected] http://nsa.co.at. From Zero to Hero. Domain Admin in einem Tag
Michael Mayer-Gishyan NSA IT Consulting e.u. @mike_srv02 [email protected] http://nsa.co.at From Zero to Hero Domain Admin in einem Tag Agenda Vita Introduction to NTLM and Kerberos Pass-the-Hash Techniques
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection Sean Metcalf (@PyroTek3) CTO, DAn Solutions sean [@] dansolutions _._com DAnSolutions.com ADSecurity.org ABOUT Chief Technology Officer
Windows security for n00bs part 1 Security architecture & Access Control
Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection
Red vs. Blue: Modern Active Directory Attacks, Detection, & Protection Sean Metcalf (@PyroTek3) CTO, DAn Solutions sean [@] dansolutions _._com http://dansolutions.com http://www.adsecurity.org ABOUT Chief
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
STARTER KIT. Infoblox DNS Firewall for FireEye
STARTER KIT Introduction Infoblox DNS Firewall integration with FireEye Malware Protection System delivers a unique and powerful defense against Advanced Persistent Threats (APT) for business networks.
Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List
Hacker s Perspective on your Windows Infrastructure: Windows 10 Mandatory Check List Paula Januszkiewicz CQURE: CEO, Penetration Tester CQURE Offices: New York, Dubai, Warsaw MVP: Enterprise Security,
VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014
VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware View Radius authentication configuration for SMS PASSCODE With the introduction of RADIUS authentication support in VMware View it is possible
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Creating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
Administering a SQL Database Infrastructure (MS- 20764)
Administering a SQL Database Infrastructure (MS- 20764) Length: 5 days Overview About this course This five-day instructor-led course provides students who administer and maintain SQL Server databases
Session 17 Windows 7 Professional DNS & Active Directory(Part 2)
Session 17 Windows 7 Professional DNS & Active Directory(Part 2) Fall 2011 ITE153 Operating Systems 1 Session 17 Windows 7 Professional Operating in Microsoft Networks Fall 2011 ITE153 Operating Systems
Windows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
Pass-the-Hash: How Attackers Spread and How to Stop Them
Pass-the-Hash: How Attackers Spread and How to Stop Them SESSION ID: HTA-W03 Mark Russinovich Technical Fellow Microsoft Corporation Nathan Ide Principal Development Lead Microsoft Corporation Pass-the-Hash:
This report is a detailed analysis of the dropper and the payload of the HIMAN malware.
PAGE 5 Check Point Malware Research Group HIMAN Malware Analysis December 12, 2013 Researcher: Overview This report is a detailed analysis of the dropper and the payload of the HIMAN malware. This malware
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect
Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Table of Contents page 2 page 4 page 6 page 8 page 9 page 10 page 11 Overview I. Sauce Labs Data
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41
Managing Local Administrator Passwords with LAPS 10/14/2015 PENN STATE SECURITY CONFERENCE
Managing Local Administrator Passwords with LAPS 2015 PENN STATE SECURITY CONFERENCE DAN BARR [email protected] SYSTEMS ADMINISTRATOR, APPLIED RESEARCH LABORATORY The Shared Password Threat Shared passwords
Online Payments Threats
July 3, 2012 Introduction...2 Tested Products...2 Used Configuration...3 Real Malware Inspiration...3 Total Scores Chart...4 Conclusion...4 About matousec.com...4 Detailed Descriptions of Tests...5 Detailed
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
Exchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
ViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
Hosts HARDENING WINDOWS NETWORKS TRAINING
BROADVIEW NETWORKS Hosts HARDENING WINDOWS NETWORKS TRAINING COURSE OVERVIEW A hands-on security course that teaches students how to harden, monitor and protect Microsoft Windows based networks. A hardening
CMB 207 1I Citrix XenApp and XenDesktop Fast Track
CMB 207 1I Citrix XenApp and XenDesktop Fast Track This fast paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the datacenter
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
How to Efficiently Protect Active Directory from Credential Theft & Large Scale Compromise
How to Efficiently Protect Active Directory from Credential Theft & Large Scale Compromise An Approach Based on Real-World Expertise Friedwart Kuhn, [email protected] Digital unterschrieben von Friedwart Kuhn
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
WINDOWS REGISTRY AUDITING CHEAT SHEET - Win 7/Win 2008 or later
This Windows Registry Auditing Cheat Sheet is intended to help you get started with basic and necessary Registry Auditing. This cheat sheet includes some very common items that should have auditing enabled,
TZWorks Windows Event Log Viewer (evtx_view) Users Guide
TZWorks Windows Event Log Viewer (evtx_view) Users Guide Abstract evtx_view is a standalone, GUI tool used to extract and parse Event Logs and display their internals. The tool allows one to export all
Speedy Organizer. SQL Server 2008 R2 RTM Express - Installation Guide Introduction
Speedy Organizer SQL Server 2008 R2 RTM Express - Installation Guide Introduction Contents Revision table... 1 1 Introduction... 2 2 SQL Server 2008 Express installation... 2 2.1 Installation... 2 3 Post
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Securing ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri [email protected] Agenda Review Basic Security Workflow ArcGIS Server Roles and
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
7.0 Self Service Guide
7.0 Self Service Guide Copyright 2010 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
304 - APM TECHNOLOGY SPECIALIST
ABOUT THE 304-APM TECHNOLOGY SPECIALIST EXAM. The 304-APM Technology Specialist exam is the required to achieve Certified F5 Technology Specialist, APM status. Successful completion of the APM Technology
CXD-202-1 Citrix XenDesktop 5 Administration
CXD-202-1 Citrix XenDesktop 5 Administration This course provides the foundation necessary for administrators to effectively centralize and manage desktops in the datacenter and deliver them as a service
Information Assurance Directorate
National Security Agency/Central Security Service Information Assurance Directorate Reducing the Effectiveness of Pass-the-Hash November 19, 2013 Revision 1 A product of the Network Components and Applications
New Zealand National Cyber Security Centre
Unclassified New Zealand National Cyber Security Centre Application Whitelisting With Microsoft Applocker June 2012 V1.0.5 Application Whitelisting with Microsoft Applocker Cyber Security Plan As outlined
Check list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
Security in the Sauce Labs Cloud
SAUCE LABS REPORT Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Overview It s impossible to deny that in this day and age internet security should
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security
Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1 Confidentiality and privacy: Protect
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.
Hosted by Introductions Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP [email protected] CRMUG Chairperson Miami & Tampa Co Chair 250+ Dynamics CRM
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
SQL Server 2008 Express - Installation Guide
SQL Server 2008 Express - Installation Guide SQL Server 2008 Express - Installation Guide Page 2 Introduction Contents Revision table... 2 1 Introduction... 3 2 SQL Server 2008 Express installation...
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
Securing Administrator Access to Internal Windows Servers
Securing Administrator Access to Internal Windows Servers Contents 1. Introduction... 3 2. PKI implementation... 3 Require two-factor authentication for computers... 3 Require two-factor authentication
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
By Skip Duckwall and Chris Campbell
By Skip Duckwall and Chris Campbell for Blackhat USA 2013 Introduction User credentials are one of the most powerful items an attacker can obtain. Single-factor, or passwordbased credentials are dangerous
TLP: GREEN FBI. FBI Liaison Alert System # A-000049-MW
Liaison Alert System # A-000049-MW The following information was obtained through investigation and is provided in conjunction with the s statutory requirement to conduct victim notification as outlined
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
PowerShell for Penetration Testers
Training: PowerShell for Penetration Testers Dates of the training: March 14-15,2016 in Heidelberg, Germany Book Now using the code: TR16HMTRAINING and save an additional 10% of the current valid rate!
NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2
NNT CIS Microsoft Windows Server 2008 R2 Benchmark Level 1 Member Server v2-1-0-2: NNTDC01 On NNTDC01 - By admin for time period 5/23/2014 8:49:51 AM to 5/23/2014 8:49:51 AM NNT CIS Microsoft Windows Server
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014
Citrix Netscaler Advanced guide for SMS PASSCODE SMS PASSCODE 2014 Citrix Netscaler Advanced guide for SMS PASSCODE. This document outlines configuration scenarios with SMS PASSCODE and Citrix Netscaler.
Integrating Web Application Security into the IT Curriculum
Integrating Web Application Security into the IT Curriculum James Walden Northern Kentucky University Topics 1. 2. 3. 4. Why should we teach web application security? What material do we need to cover?
BUILDING SECURITY IN. Analyzing Mobile Single Sign-On Implementations
BUILDING SECURITY IN Analyzing Mobile Single Sign-On Implementations Analyzing Mobile Single Sign-On Implementations 1 Introduction Single sign-on, (SSO) is a common requirement for business-to-employee
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Sage Accpac CRM 5.8. Self Service Guide
Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,
Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016
Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals
Five Steps to Improve Internal Network Security Chattanooga Information security Professionals Who Am I? Security Analyst: Sword & Shield Blogger: averagesecurityguy.info Developer: github.com/averagesecurityguy
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Security Options... 1
Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett [email protected] By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition
Administering a SQL Database Infrastructure
Administering a SQL Database Infrastructure 20764A 5 Days Instructor-led, Hands on Course Information This five-day instructor-led course provides students who administer and maintain SQL Server databases
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Administering a SQL Database Infrastructure 20764; 5 Days; Instructor-led
Administering a SQL Database Infrastructure 20764; 5 Days; Instructor-led Course Description This five-day instructor-led course provides students who administer and maintain SQL Server databases with
Microsoft 20764 - Administering a SQL Database Infrastructure
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20764 - Administering a SQL Database Infrastructure Length 5 days Price $4169.00 (inc GST) Version A Overview This five-day instructor-led course provides
WHITE PAPER AUGUST 2014
THE DEFINITIVE GUIDE TO CLOUD ACCESS SECURITY BROKERS WHITE PAPER AUGUST 2014 For many enterprises, security and compliance concerns hamper adoption of cloud applications. Furthermore, cloud applications
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios 2 OpenTopic TOC Contents What is BIG-IP Edge Client app for ios?... 3 About supported authentication types... 3 About establishing
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
MS-10775: Administering Microsoft SQL Server 2012 Databases. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.
MS-10775: Administering Microsoft SQL Server 2012 Databases This five-day instructor led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2012 database. The course
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Commercially Proven Trusted Computing Solutions RSA 2010
Commercially Proven Trusted Computing Solutions RSA 2010 Hardware Self-Encrypting Drives (SEDs) Unique Security Features Encryption below the file system Hardware root-of-trust for encryption Tamper resistant
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Windows Security Environment
Motivation Popularity, widespread use of Windows Big surface, big impact Protection via user/kernel architecture and CPU modes Multiple-users environment, same physical resources Easy to install < security
EASTERN ARIZONA COLLEGE Web Server Administration
EASTERN ARIZONA COLLEGE Web Server Administration Course Design 2010-2011 Course Information Division Business Course Number CMP 256 Title Web Server Administration Credits 3 Developed by Michael Rose
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
PowerShell Configuration Guide
PowerShell Configuration Guide Table of Contents Windows PowerShell 2 Prerequisites... 3 IIS Settings... 3 ActiveSync Server PowerShell Connection Settings... 8 NotifyMDM Version 3.x Windows PowerShell
