give me the password and I'll rule the world dpapi, what else?
|
|
|
- Heather Hoover
- 10 years ago
- Views:
Transcription
1 give me the password and I'll rule the world dpapi, what else?
2 who am I? A question I often ask to myself let socials do the job. Francesco Picasso Reality Net System on 2
3 do you need? (given an unencrypted Windows OS ) to get WiFi password? to get Internet Explorer saved credentials? to get Chrome saved credentials? to get stored Windows Credentials? to get Windows Mail credentials? to get Dropbox decrypted databases? to get icloud authentication tokens? to decrypt EFS files? and much on 3
4 DPAPI then you need to understand data protection API DPAPI first introduced with Windows (october 2001 ages!) simply and smart it receives plaintext and returns ciphertext and vice versa, hopefully does not provide any storage facility not officially documented ( did you expect it? ) CryptProctedData and on 4
5 crypt «protect» from an application perspective «plese encrypt my secret» Then the application must store somewhere the result the on 5 CryptProtectData( cleartext_blob, NULL, NULL, NULL, NULL, 0, encrypted_blob ); // for purists: pseudo-code blob? Yes, something truly opaque typedef struct _CRYPTOAPI_BLOB { DWORD cbdata; // data length BYTE *pbdata; // data
6 @dfirfpi on 6 crypt unprotect CryptUnProtectData( encrypted_blob, NULL, NULL, NULL, NULL, 0, cleartext_blob ); // it s pseudo-code again extremely easy to use application needs to know almost nothing and should take care of storage only. poptionalentropy (aka entropy) Remember it for later discussion..
7 Digging inside on 7
8 DPAPIck All the next information comes from an awesome reverse engineering project presented at Reversing DPAPI and Stealing Windows Secrets Offline by Jean-Michel Picod and Elie Bursztein with the solid python code dpapick dpapick Windows Xp/Vista only (up to slide 29, at least ) The presentation covers the main topics, for details refer to the on 8
9 de-opaquing blobs DPAPI blobs contains the encrypted data and all the info and reference to decrypt them this is the blob returned by CryptProtectData DPAPI BLOB (partial) version = 1 provider = df9d8cd d1-8c7a-0c04fc297eb mkey = ba76b33f-4b97-4e fb972cec descr = «cool dpapi blob» cipheralgo = AES-256 [0x6610] hashalgo = sha512 [0x800e] data = da971a5559ead33ad490b22df salt cipher crc = 24cbc980da28ffd49f6f3aa4f3165ad = d45f5bfe0c72a f47354c45e = 710dd3fadb2ac02e0631d812e93ef6f hash algorithm used to derive the decryption key, crypto algorithm used to decrypt the key IVs and material used for derivation and decryption it s not self-standing to decrypt the data the Master Key is on 9
10 master key Master Key (file) contains the encrypted «master key» data used to decrypt blobs. this is the blob returned by CryptProtectData MASTER KEY (partial) or, better, the necessary data used to derive the blobs decryption keys. MasterKeyFile ba76b33f-4b97-4e fb972cec version = 2 Flags = 0x5 MasterKey = 176 BackupKey = 144 CredHist = 20 DomainKey = 0 + Master Key: Masterkey block cipher algo = AES-256 [0x6610] hash algo = sha512 [0x800e] rounds = 8000 IV ciphertext = 3a2c56da9f122e4eea2ff56fba6fef78 = a1e8f40c6f6d77bd692 it s a file totally managed by the OS it s «self-standing» the user password protects the encrypted «master key» on 10
11 DPAPI brief user pwd decrypts the masterkey masterkey is used to derive the decryption key for the specific blob (using its info too) HMAC_SHA1( sha1(utf16le(password)), utf16le(sid+ \0 ) ) the blob decryption key decrypts (finally) our on 11
12 DPAPI locations <user profile dir>\appdata\roaming\microsoft\protect per user based and system? multiple master keys? what is CREDHIST file? tightly bound on 12 the current installation!
13 SYSTEM DPAPI SYSTEM has its master keys too %WINDIR%\System32\Microsoft\Protect CRYPTPROTECT_LOCAL_MACHINE flag used in CryptProtectData For example, WiFi password are SYSTEM DPAPI BLOBs grab them from XML files in \ProgramData\Microsoft\WwanSvc\Profiles User password? No, system password LSA Secrets -> SECURITY hive -> on 13 Which security? No security at all not only for WiFi
14 master keys and credhist OS renews the current master key every 3 months Previous MKs must be kept to allow old BLOBs decryption A password change results in a re-encryption of the MK (something to be said on 14 Old MKs? CREDHIST file keeps track of all user s passwords (sha1(utf16le(password))
15 DPAPI applied what we need
16 levels OS level User password dpapi level MK and BLOBs decryption app level App secrets Almost three each application could do anything before and/ or after CryptUnprotectData on 16
17 OS level get the lever
18 the traditional way crack the NTLM password hash Can use rainbow tables do you think that 13,759,005,997,841,642 (~ 2^53,6) elements are enough? (ntlm_mixalpha-numeric#1-9) No guarantee, a long even simple password will easily on 18
19 Do you remember? Memory is the target, since it has our keys in different shapes Why the password could be in RAM? SSO (Single Sign on) is the first and main reason Windows is the second J Which data, Where and How to use on 19
20 mimikatz Benjamin Delpy aka gentil_kiwi started to dig inside the lsass process in 2007, and he first discovered the presence of users cleartext password. Well-known in the pentest world for pass the hash attack, his research and tool contains a wealth of info. Simply awesome. Site> Code> The presentation covers only few on 20
21 authentication packages SSP Security Service Providers Target data is inside the lsass process 21 reversible encryption for on 21
22 mimikatz cleartext table 13 may 2014 à msv1_0 tspkg wdigest livessp kerberos NTLM No password, HASH Terminal Server (password)(no password, password if Credential Delegation policy i is On, default Off) HTTP/SASL authentication (password)(password, unless as in Win8.1 the following value is 0). HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential Windows live (password)(password) Kerberos what else? (password)(no password, or after tgt, on 22
23 sources and tools mimikatz can handle lsass process dump RAM dumps hibernation files The most complete and up to date solution is WinDbg plus the mimilib.dll extension VmWare vmem files Processes dumps 23 the easiest and cross platform. Using the mimikatz plugin I wrote. Only wdigest is supported, on Vista and Windows 7 (x86 and x64) whatever has lsass process inside on 23
24 living in a paged world Ouch! Paged out! RAM dumps are «physical» Stuffs could be paged out Until tools will manage both RAM + swap file we have an issue Searching inside the pagefile? On scene So, if passwords and/or DAPI is a target After the RAM acquisition go for lsass process dump Using procdump, for on 24
25 windbg mimikatz walkthrough 1. get a memory dump of lsass.exe 2. git clone mimikatz 3. build mimilib with Visual Studio for your architecture using SDK 4. run windbg 5. open the crash dump configure symbols!! 6. load mimilib just mimikatz on 25
26 win8.1, live and local accounts on 26
27 unlocking DPAPI forever? Prekey HMAC_SHA1(sha1(utf16le(password)), utf16le(sid+ \0 )) See previous slide The msv SSP has the NTLM and SHA1 password hashes Not the password but DPAPI can be unlocked! The msv SSP cannot be removed 27 Anyway, OS must cache on 27
28 DPAPI level get the the stand point
29 dpapick new life! dpapick is the tool to decrypt blobs ok, but for Windows 7, 8 and 8.1? After 4 years and right for the SANS DFIR meeting (showtime!) I continued the reverse engineering of DAPI I provided the code patch to handle blob decryption up to Win 8.1 warning: only local account on Windows 8.1 Live accounts uses the new DPAPI-NG on 29
30 Stay tuned! Few days for the beta Jean-Michel Picod (kudos!!) is working on the new dpapick release He is integrating the patch into the code He is adding some cool features Testing =) We are working on adding more plugins to handle specific apps blob decoding Missing> a bunch of stuffs, as lsa secrets on 30
31 finally the apps on 31
32 scenarios Just two for time reasons Get cleartext data Get credentials to get data from the cloud Bonus: it s possible to search for blobs, since the crypto provider GUID spotted is always the same on 32
33 dropbox scenario get cleartext on 33
34 dropbox heavily obfuscated clients code configuration (config.dbx) and file sync status (filecache.dbx) but they were SQLITE database (.db) before that (2012) even with virtualization no static cleartext form 34 How they are encrypted? Could be on 34
35 how dropbox encrypt dbx? didn t know at that time spotted two keys in the registry (user) the only two that are there? J that s a on 35
36 dropbox dpapi additional entropy D114A F74BD772E37E64AEE9B where did it come from? it s fixed?!?! Nicolas Ruff Florian Ledoux 36 A critical analysis of Dropbox software security (!! on 36
37 dropbox dbx decryption they almost did everything to decrypt dbx!! check the code here dpapick user password dropbox user key PBKDF2 (1066 iterations) dropbox db key SQLITE EE dbx SQLITE db D114A5 entropy, fixed APP_KEY on 37
38 sqlite encryption extension add-on to sqlite that allows read/write ops on encrypted database RC4 - AES128 (OFB, CCM) AES256 (OFB) quite complicated, made by hwaci ( licensed software (source code, perpetual license, $2000) but Ledoux and Ruff found it online that part of the source code is available from SQLite Web site 38 check here on 38
39 icloud scenario access inaccessible on 39
40 devices iphone, no access code or even broken, no way to get the data Laptop Windows with icloud installed icloud keeps your mail, documents, contacts and calendars up-todate between your iphone, ipad, ipod Touch, Mac and Windows on 40
41 icloud windows app Once installed, you ll be prompted once for credentials So, where does it keep the secret? File com.apple.aoskit.plist path: <user profile>\appdata\roaming\ Apple Computer\Preferences Binary plist, decode64 the data section A huge dpapi on 41
42 icloud windows DPAPI Crypt(Un)protectData is called with the entropy parameter set Which is a fixed 128 byte long hexadecimal string Unlock DPAPI with user password or SHA1(password) Decrypt the previous BLOB with dpapick You ll get another binary plist With the first 32bits providing its real on 42
43 icloud windows token The icloud token is the pair on 43
44 icloud windows token Using Elcomsoft EPBB (Elcomsoft Phone Password Breaker) No marketing here, they are the only providing such a cool feature Go online with the decrypted token and get the all the data Indeed they truly keep your data on 44
45 exit strategy levels on 45
46 conclusions Offensive Digital Investigations to cope with security measures (anti-forensics?) Given a ram dump, you can unlock DPAPI (swapped data issue) A bit manual Dpapick code next to be released with automatic scripts (aka probes ) Push the button ( who said hurrah??! ). We have not seen many stuffs Just one: pin / picture password in Win8 allow instant recover or user on 46
47 I have a dream What about dpapick + rekall + plaso? You could, just with a command, grab All passwords/sha1 from hiberfil files Even using VSS on previous hiberfils! Then search/parse BLOBs and automatically decrypt them Cool, isn t on 47
48 thank on 48
Beyond files forensic OWADE cloud based forensic
Beyond files forensic OWADE cloud based forensic Elie Bursztein Stanford University Ivan Fontarensky Cassidian Matthieu Martin Stanford University Jean Michel Picod Cassidian 1 The world is moving to the
mimikatz 2.0 Benjamin DELPY `gentilkiwi`
mimikatz 2.0 Benjamin DELPY `gentilkiwi` Our little story `whoami`, why am I doing this? mimikatz 2.0 & sekurlsa Focus on Windows 8.1 et 2012r2 Kerberos & strong authentication Questions / Answers And
Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell
Pass-the-Hash II: Admin s Revenge Skip Duckwall & Chris Campbell Do you know who I am? Skip Co-presented PTH talk last year at BH, Derbycon http://passing-the-hash.blogspot.com @passingthehash on twitter
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really?
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. {a.belenko,d.sklyarov} @ elcomsoft.com 1 Agenda Authentication:
Passcape Software. DPAPI flaw. Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012
DPAPI flaw Vulnerability of DPAPI data protection in Win2K, Win2K3, Windows Server 2008, and Windows Server 2012 Content 1 Brief description of the vulnerability 2 1.1 The... problem 2 1.2 Affected...
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013
ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013 FORENSIC ACQUISITION.BEFORE STARTING When we are dealing with the forensics acquisition of an ios device
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Deploying EFS: Part 1
Security Watch Deploying EFS: Part 1 John Morello By now, everyone has heard reports about personal or sensitive data being lost because of laptop theft or misplacement. Laptops go missing on a regular
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
Performance Analysis of Client Side Encryption Tools
Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
CLOUD STORAGE FORENSICS MATTIA EPIFANI SANS EUROPEAN DIGITAL FORENSICS SUMMIT PRAGUE, 7 OCTOBER 2013
CLOUD STORAGE FORENSICS MATTIA EPIFANI SANS EUROPEAN DIGITAL FORENSICS SUMMIT PRAGUE, 7 OCTOBER 2013 SUMMARY Cloud Storage services Testing environment and methodology Forensics artifacts left by Cloud
Manual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Reverse engineering hardware for software reversers: studying an encrypted external HDD
Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT 2015-10-02 / Hardwear.io 2015-10-02 / Hardwear.io 2 Introduction Why
Configuring Authentication for Microsoft Windows
Chapter 4 Configuring Authentication for Microsoft Windows In this chapter: Storing and Transmitting Credentials..............................69 Storing Secrets in Windows......................................83
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Forensic analysis of iphone backups
Forensic analysis of iphone backups The goal of iphone Backup Forensics analysis is extracting data and artefacts from the itunes backups without altering any information. iphone forensics can be performed
MelbourneOnline Hosted Exchange Setup
MelbourneOnline Hosted Exchange Setup Your email on our Hosted Exchange servers can be accessed by multiple devices including PC, Mac, iphone, IPad, Android, Windows Phone and of course webmail. It s all
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001
CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001 INTRODUCTION This exam will certify that the successful candidate has the knowledge and skills required
Michael Mayer-Gishyan NSA IT Consulting e.u. @mike_srv02 [email protected] http://nsa.co.at. From Zero to Hero. Domain Admin in einem Tag
Michael Mayer-Gishyan NSA IT Consulting e.u. @mike_srv02 [email protected] http://nsa.co.at From Zero to Hero Domain Admin in einem Tag Agenda Vita Introduction to NTLM and Kerberos Pass-the-Hash Techniques
Backing up your digital image collection provides it with essential protection.
Backing up your digital image collection provides it with essential protection. In this chapter, you ll learn more about your options for creating a reliable backup of your entire digital image library.
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Windows passwords security
IT Advisory Windows passwords security ADVISORY WHOAMI 2 Agenda The typical windows environment Local passwords Secure storage mechanims: Syskey & SAM File Password hashing & Cracking: LM & NTLM Into the
Passwords the server side
Passwords the server side A tour of decreasingly bad ideas regarding server-side password handling. Thomas Waldmann @ EuroPython 2013 Disclaimer I am not a crypto or security expert, just a caring developer
Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Privilege Escalation via Client Management Software November 21, 2015 November 21, 2015 Matthias Deeg BSidesVienna 0x7DF 1 Who am I? Dipl.-Inf. Matthias Deeg Expert IT Security Consultant CISSP, CISA,
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
A Standards-based Approach to IP Protection for HDLs
A Standards-based Approach to IP Protection for HDLs John Shields Staff Engineer, Modelsim Overview Introduction A Brief Status First Look at The Flow Encryption Technology Concepts Key Management Second
itunes: About ios backups
itunes: About ios backups itunes can back up your settings, Messages, Camera Roll, documents, saved games, and other data. Backups don't contain content synced to the device, such as movies, music, podcasts,
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
Keeper Password Manager & Digital Vault
Enterprise Keeper Password Manager & Digital Vault Contact Sales (312) 226-5544 [email protected] r 8.19.15 Enterprise Keeper is the world s most secure digital vault. Contact Sales (312) 226-5544
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Getting the most from Apple Mail
Getting the most from Apple Mail Larry Kerschberg, Roy Wagner, Jonathan Bernstein and Friends February 28, 2015 1 Topics Mail on Macs and ios devices Configuring your accounts IMAP Folders VIP Contacts,
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Presto User s Manual. Collobos Software Version 1.6. 2014 Collobos Software, Inc http://www.collobos.com
Presto User s Manual Collobos Software Version 1.6 2014 Collobos Software, Inc http://www.collobos.com Welcome To Presto 3 System Requirements 3 How It Works 4 Presto Service 4 Presto 4 Printers 5 Virtual
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Configure Outlook 2013 to connect to Hosted Exchange
Configure Outlook 2013 to connect to Hosted Exchange Anglia IT Solutions Hosted Exchange supports: Windows XP, 7 and 8 Microsoft Office 2007 / 2010 / 2013 These instructions describe how to setup Outlook
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
How to Efficiently Protect Active Directory from Credential Theft & Large Scale Compromise
How to Efficiently Protect Active Directory from Credential Theft & Large Scale Compromise An Approach Based on Real-World Expertise Friedwart Kuhn, [email protected] Digital unterschrieben von Friedwart Kuhn
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Mac OS X Directory Services
Mac OS X Directory Services Agenda Open Directory Mac OS X client access Directory services in Mac OS X Server Redundancy and replication Mac OS X access to other directory services Active Directory support
SortSite Enterprise Deployment Guide v1.1.13
SortSite Enterprise Deployment Guide v1.1.13 1. Introduction... 1 2. Architecture... 2 3. Recommended Hardware... 3 4. Performance Considerations... 3 5. Deployment... 4 5.1. Required Information... 4
Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374
Fall 2011 Forensic Examination of Encrypted Systems Matthew Postinger COSC 374 Table of Contents Abstract... 3 File System Encryption... 3 Windows EFS... 3 Apple FileVault... 4 Full Disk Encryption...
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Information Technology Services. Your mailbox is moving to the cloud. Here is what to expect.
Your mailbox is moving to the cloud. Here is what to expect. Table of Contents Information for Outlook Web App users:... 2 Information for Office 2007 and 2010 Professional users:... 2 Information for
The End is Near. Options for File Management and Storage
The End is Near Options for File Management and Storage Options Google Drive icloud Drive USB Drives H:Drive icloud icloud IOS 8 icloud Drive icloud With icloud Drive, you can safely store all your presentations,
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Retrieving Internet chat history with the same ease as a squirrel cracks nuts
Retrieving Internet chat history with the same ease as a squirrel Yuri Gubanov CEO, Belkasoft http://belkasoft.com SANS Forensic Summit September 21, 2011 London, Great Britain What is Instant Messenger!
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Remote Access Enhancements
Remote Access Enhancements Citrix/Epic Set-up Instructions Provided By: Akron Children s IT Department Date: 7/11/2012 Version: v6 2012 Children s Hospital Medical Center of Akron Table of Contents 1.
WATCHING THE WATCHDOG: PROTECTING KERBEROS AUTHENTICATION WITH NETWORK MONITORING
WATCHING THE WATCHDOG: PROTECTING KERBEROS AUTHENTICATION WITH NETWORK MONITORING Authors: Tal Be ery, Sr. Security Research Manager, Microsoft Michael Cherny, Sr. Security Researcher, Microsoft November
A Guide For Reviewers. A Guide For Reviewers
Table Of Contents WELCOME TO PASSWORD BOSS!.... 2 PASSWORD BOSS: A SMARTER WAY TO STAY SECURE ONLINE....3 HOW PASSWORD BOSS PROTECTS YOUR SECURITY AND PRIVACY.... 5 INSTALLING PASSWORD BOSS AND CREATING
Reviewer Guide Core Functionality
securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
Everything is Terrible
Everything is Terrible A deep dive into provisioning and code signing Hello and welcome to Everything is Terrible. This is a deep dive talk into the processes behind provisioning and code signing on Apple
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
How to wipe personal data and email from a lost or stolen mobile device
IS Doc no 858 How to wipe personal data and email from a lost or stolen mobile device This document explains what to do if your mobile device (iphone, ipod Touch, ipad, mobile phone etc.) is stolen or
Rocket Mail Smartphone Configuration Guide. Version 2.0
Rocket Mail Smartphone Configuration Guide Version 2.0 Nick Sherman 3/1/2013 Android Configuration 1. From the Applications menu, select Email. This application may be named Mail on some versions of Android.
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Do you know what makes NetSupport Manager so unique?
Do you know what makes NetSupport Manager so unique? NetSupport Manager is recognised internationally as the market leading Remote Control solution for Enterprises large and small. Over the last 23 years,
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
Using Microsoft Visual Studio 2010. API Reference
2010 API Reference Published: 2014-02-19 SWD-20140219103929387 Contents 1... 4 Key features of the Visual Studio plug-in... 4 Get started...5 Request a vendor account... 5 Get code signing and debug token
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Project: Simulated Encrypted File System (SEFS)
Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,
Cloud Backup Express
Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...
The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet
The Security of MDM systems Hack In Paris 2013 Sebastien Andrivet Who am I? Sebastien Andrivet Switzerland (Geneva) Specialized in security Mobiles (ios, Android) Forensic Developer C++, x86 and ARM (Cyberfeminist
Introduction to BitLocker FVE
Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk
AkrutoSync 4.0 User Guide
AKRUTO AkrutoSync 4.0 User Guide Welcome Thank you for choosing AkrutoSync. AkrutoSync can synchronize your Contacts, Calendar and Tasks between Outlook on your computer and your Windows Phone. AkrutoSync
SuperOffice AS. CRM Online. Installing the Citrix Online Web plug-in
SuperOffice AS CRM Online Installing the Citrix Online Web plug-in Index Introduction... 3 Prerequisites... 3 Considerations... 3 FOR WINDOWS USERS:... 4 Download the installation package... 4 Installing
1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010
Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Access Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
Charles Firth [email protected]. Managing Macs in a Windows World
Charles Firth [email protected] Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
Mobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
Python Cryptography & Security. José Manuel Ortega @jmortegac
Python Cryptography & Security José Manuel Ortega @jmortegac https://speakerdeck.com/jmortega Security Conferences INDEX 1 Introduction to cryptography 2 PyCrypto and other libraries 3 Django Security
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute
Detecting Malware With Memory Forensics Hal Pomeranz SANS Institute Why Memory Forensics? Everything in the OS traverses RAM Processes and threads Malware (including rootkit technologies) Network sockets,
AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008
AxCrypt File Encryption Software for Windows Quick Installation Guide Version 1.6.3 January 2008 Copyright 2005-2008 Svante Seleborg, Axantum Software AB 2(19) This guide describes how to install and quickly
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Outlook 2010 Setup Guide (POP3)
Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 8/31/2012 Copyright 2012 Smarsh, Inc. All rights Purpose: This document will assist the end user in configuring Outlook 2010 to access
