Windows network services internals HiverCon 2003
|
|
|
- Aron Dorsey
- 10 years ago
- Views:
Transcription
1 Windows network services internals HiverCon 2003 Jean-Baptiste Marchand Jean-Baptiste Marchand
2 Agenda TCP/IP stack SMB/CIFS MSRPC References 2 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
3 TCP/IP stack Ephemeral ports allocation policy netstat bugs Identifying processes behind sockets Lack of privileged ports TCP sockets hijacking 3 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
4 Ephemeral ports Ephemeral ports Typically used for TCP or UDP clients Also used for RPC services running on TCP or UDP (hence the portmapper service) Default range: Highest port: MaxUserPort registry value Exceptions in this range: ReservedPorts registry value Do not appear in the registry by default 4 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
5 Ephemeral ports range configuration 5 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
6 Ephemeral ports allocation policy Ephemeral ports usages TCP & UDP clients typically do not specify a source port, thus an ephemeral port is allocated RPC services also run on dynamic ports After system startup, RPC services typically use ports immediately higher than 1024 (1025, 1026, 1028,...) Ephemeral ports allocation Incremental, starting from 1025 Shared between TCP and UDP 6 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
7 nc.exe: TCP/UDP client or server nc.exe (netcat) Windows port of the well-known nc Unix utility Usages: TCP/UDP client or server 7 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
8 Ephemeral ports: TCP clients First TCP client: source port 3364/tcp Second TCP client: source port 3365/tcp Next UDP client: 3366/udp 8 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
9 Ephemeral ports example 9 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
10 netstat bugs history netstat bugs NT 4.0 < SP3: LISTENING sockets not displayed NT 4.0: for each bound UDP socket, a LISTENING TCP socket with the same port is displayed NT 4.0 and W2K: source ports used for outgoing TCP connections are displayed as LISTENING Windows Server 2003: no known bug / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
11 netstat bugs: UDP -> TCP (NT 4) 11 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
12 netstat bugs: LISTENING bug (W2K) 12 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
13 W2K3: LISTENING bug fixed 13 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
14 Identifying processes behind sockets Identifying processes behind sockets is a common administration task Before WXP, not possible without third-party tools netstat -o option (XP and W2K3) + tasklist command (XP and W2K3) Third-party tools TCPview (sysinternals) fport (Foundstone) 14 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
15 netstat -o option: XP, W2K3 15 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
16 TCPView 16 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
17 Fport 17 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
18 Lack of privileged ports Privileged ports Used to restrict ports < 1024,typically used by TCP servers, to system administrators Examples: 25/tcp (SMTP), 80/tcp (HTTP), 2049/tcp (NFS, exception) Windows TCP/IP stack: no privileged ports Any user can bind a TCP server to any port Can be used to disrupt running services 18 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
19 TCP server hijacking TCP server hijacking Became widely known with the release of a Windows port of the netcat utility Technical reasons: Lack of privileged ports SO_REUSEADDR socket option Well-known example NT4 SMB server hijacking NetBT (NetBIOS over TCP/IP) session port (139/tcp) 19 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
20 NT4: SMB server hijacking SMB server hijacking nc listener, bound to exactly the same port and address as the SMB server Last server (nc) receives incoming TCP connections! 20 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
21 IIS5 hijacking IIS5 HTTP service Bound by default to :80 Lack of privileged ports A second TCP server can be bound to 80/tcp Using a specific IPv4 address (with SO_REUSEADDR) TCP connections to the specific IPv4 address Received by the second TCP server Not IIS5! 21 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
22 IIS5 hijacking: example nc listener receives HTTP requests, hijacking IIS5 HTTP service 22 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
23 TCP duplicate bindings Duplicate bindings Two TCP servers bound to exactly the same local address (IPv4 address, TCP port) Ex: :80 and :80, x.y.z.t:42 and x.y.z.t:42 Usually not supported by TCP/IP implementations Supported by Windows... Question: which TCP server receives TCP connections? Last server in NT 4.0 Random server in W2K 23 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
24 IIS5 duplicate bindings 24 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
25 Avoiding TCP server hijacking SO_EXCLUSIVEADDRUSE socket option Introduced in Windows NT 4.0 SP4 " The SO_EXCLUSIVEADDRUSE option prevents other sockets from being forcibly bound to the same address and port, a practice enabled by the SO_REUSEADDR option; such reuse can be executed by malicious applications to disrupt the application " Not used by all Microsoft products... Example: IIS 5, as seen before In W2K Used by RPC services listening on TCP/IP or UDP/IP Used by SQL Server (1433/tcp) Used by NetBT driver (137/udp, 138/udp, 139/tcp, 445/tcp) 25 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
26 SO_EXCLUSIVEADDRUSE: W2K 26 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
27 SO_EXCLUSIVEADDRUSE: afd driver Winsock API Implemented by the Afd driver Creates TDI file objects to represent TCP or UDP sockets SO_EXCLUSIVEADDRUSE socket option Corresponds to a NULL value for the ShareAccess parameter of the ZwCreateFile() function used to create TDI file objects DisableAddressSharing registry value: global protection, when set to 1 27 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
28 SMB/CIFS SMB/CIFS introduction SMB transport SMB implementation SMB administration SMB as transport protocol: DCE RPC over SMB 28 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
29 SMB/CIFS: introduction SMB/CIFS SMB: Server Message Block protocol Network protocol behind Windows networking Ressources sharing (files and printer) Renamed by MS to CIFS around 1996/1997 Common Internet File System Frequently confused with NetBT (NetBIOS over TCP/IP) NetBT is only a transport protocol for SMB/CIFS Proprietary protocol, mostly documented by the work of the Samba team (open-source SMB/CIFS implementation) Reference documentation: Implementing CIFS, written by Christopher R. Hertel 29 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
30 SMB transport SMB transport Before W2K: SMB typically carried into NetBT NetBIOS over TCP/IP:139/tcp W2K >: SMB can be carried directly into TCP NetBT layer removed nbss pseudo-header maintained for backward compatibility Raw SMB transport: 445/tcp 30 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
31 SMB transport: NT 4 vs W2K SMB NetBT TCP (port 139) SMB TCP (port 445) Windows NT Windows 2000 > 31 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
32 SMB NetBT transport: on the wire 32 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
33 Raw SMB transport: on the wire 33 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
34 SMB implementation kernel-mode drivers Client-side: redirector rdr.sys (NT), mrxsmb.sys (W2K and >) Server-side: server (srv.sys) User-mode services lanmanworkstation: redirector configuration lanmanserver: server configuration 34 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
35 SMB implementation: drivers 35 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
36 SMB implementation: services 36 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
37 SMB bindings SMB bindings Per network adapter Client-side: Client for Microsoft Networks Server-side: File and Printer Sharing for Microsoft Networks Configuration GUI: network adapter properties CLI: net config rdr, net config srv 37 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
38 SMB bindings: GUI 38 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
39 SMB bindings: CLI 39 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
40 SMB transport configuration NetBT transport 40 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
41 NetBT: NetBIOS names NetBIOS names Name suffix identifies nature of the service <00>: redirector service, <20>: server service 41 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
42 SMB transport: raw SMB raw SMB transport Global device: NetbiosSmb Created by the NetBT driver Can not be bound/unbound to a specific network adapter SmbDeviceEnabled registry value 42 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
43 SMB transport choice raw SMB preferred over NetBT transport If both transports are active, the redirector resets the TCP connection to port 139 (NetBT) 43 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
44 SMB key concepts SMB key concepts Share: group of shared ressources Files share Ex: administrative shares (C$, ADMIN$) Shared printers IPC$: special share Gives access, over the network, to named pipes SMB session The SMB protocol is session-oriented A SMB session starts with authentication Use of a network authentication protocol (NT)LM Kerberos 44 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
45 SMB session: examples 45 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
46 Using the redirector Establishing an SMB session: use records net use command Ex: net use * \\unc_name\share (cached credentials) Ex: net use * \\ \myshare /u:jbm * (alternate credentials) Ex: net use \\ \IPC$ /u: * (null session) net use : enumerate use records in the current logon session 46 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
47 net use: examples 47 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
48 SMB server administration Administration (net( command) Shares management: net share Sessions management: net sessions displays a list of established SMB sessions can disconnect any session (/delete( /delete) Shared resources management: net files displays a list of accessed local resources can close any shared resource (/close( /close) 48 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
49 SMB sessions management 49 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
50 SMB as a transport protocol SMB as a transport protocol IPC$ share: gives access to named pipes over the network Named pipes are used to transport remote procedure calls DCE RPC over SMB Named pipes are used as DCE RPC endpoints 50 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
51 MSRPC MSRPC introduction Typical MSRPC protocol sequences named pipes: ncacn_np LPC ports: ncalrpc TCP/IP: ncacn_ip_tcp, ncadg_ip_udp NULL sessions RPC services examples MSRPC security 51 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
52 MSRPC: introduction Microsoft implementation of DCE RPC Used in all versions of Windows NT, at all levels Typical use: NT domains, remote administration, DCOM A brief history of Windows Transport independent TCP/IP, IPX/SPX, NETBEUI,... SMB transport (Windows-specific), using named pipes as DCE RPC endpoints DCE RPC Protocol Data Units (PDUs) are sent over named pipes, using SMB commands 52 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
53 MSRPC transport MSRPC typical protocol sequences ncacn_np: named pipes (using SMB) ncalrpc: LPC (Local Procedure Calls) ports ncacn_ip_tcp, ncadg_ip_udp: TCP or UDP ports Other transports: ncacn_http (HTTP transport), IPX/SPX, NetBeui.. 53 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
54 MSRPC services classification MSRPC services classification ncacn_np RPC services NT 4.0 domains remote administration tools ncacn_ip_tcp and ncadg_ip_udp RPC services Active Directory domains DCOM 54 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
55 Named pipes Inter-Process Communication (IPC) mechanism Locally or over the network (using SMB) Implemented by a file system driver npfs.sys (Ex: \Device\NamedPipes\lsass) Named pipes enumeration tool pipelist (sysinternals.com) 55 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
56 Named pipes: W2K 56 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
57 Named pipes: W2K3 57 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
58 npfs aliases Named pipes aliases Npfs\Aliases registry value \pipe\lsass aliases Windows NT, 2K, XP, Server 2003: \pipe\{netlogon, lsarpc, samr} \pipe\ntsvcs aliases: Windows NT, 2K: \pipe\{srvsvc, wkssvc, eventlog, browse, msgsvc, svcctl, w32time (W2K only)} Windows XP, Server 2003: \pipe\{eventlog, svcctl} 58 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
59 npfs aliases: registry values 59 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
60 DCE RPC remote mgmt interface DCE RPC mgmt interface interface: set of related operations management interface Implicitly supported by any DCE RPC service ifids tool (Todd Sabin) Identification of named pipes used as MSRPC endpoints, using ifids Ifids -p ncacn_np -e \pipe\pipe_name pipe_name \\UNC_name 60 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
61 ifids: named pipes endpoints 61 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
62 ncalrpc: LPC port endpoints 62 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
63 ifids: LPC ports endpoints 63 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
64 NULL sessions NULL session Unauthenticated SMB session to the IPC$ share Actually, authentication is realized with empty username and password, hence the NULL session terminology Can be used by an attacker to gather information about a remote system Using RPC calls over the ncacn_np transport 64 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
65 NULL sessions: access control Access controls involved in a NULL session IPC$ share connection: always (implictly) permitted IPC$ missing in the NullSessionShares registry value Named pipes access: named pipe dependent NullSessionPipes registry value + hardcoded names Runtime (RPC operations) checks At runtime + DACL on SAM and LSA objects Access control, using the impersonation token of the NULL session 65 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
66 NULL sessions: registry values Registry values NullSessionShares: shares to which it is possible to connect with a NULL session NullSessionPipes: named pipes that can be opened in the context of a NULL session to IPC$ 66 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
67 NULL sessions: implictly allowed named pipes Hardcoded named pipes (srv.sys) \pipe\{lsarpc,samr,netlogon,wkssvc,srvsvc,browser} 67 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
68 NULL session: impersonation token NULL session impersonation token By default, contains the EVERYONE SID Anything allowed for the EVERYONE SID is possible in a NULL session Registry values RestrictAnonymous: NT4, W2K When set to 2, removes EVERYONE from the token EveryoneIncludesAnonymous: WXP, W2K3 When unset, equivalent to RestrictAnonymous == 2 68 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
69 RPC services: NT 4.0 domains NT 4.0 domains Use RPC services, using named pipes endpoints Typical named pipes lsarpc: LSA (Local Security Authority) RPC service samr: SAM (Security Account Manager) RPC service netlogon : netlogon RPC service 69 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
70 RPC services: administration tools Windows administration tools Administration API use RPC functions Different transports are used for a local or a remote system Local system: ncalrpc or ncacn_np transports Remote system: ncacn_np transport 70 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
71 RPC-based administration tools RPC-based administration tools server manager, services manager, registry editor, event viewer, IIS administration, dns server, task scheduler, certificate service,... Named pipes (endpoints) names identify the service svcctl (services management), winreg (remote registry), inetinfo (iis5), eventlog (eventlog service),... New administration tools use WMI thus DCOM, thus RPC services over TCP/IP 71 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
72 Remote administration: example 72 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
73 MSRPC security: transport protocols Protocol sequences that can be reached remotely A RPC service that listen on TCP/IP can be reached remotely Most RPC services listening on TCP/IP are bound to all network interfaces ( ) For some RPC services, it is possible to configure interfaces binding restrictions A RPC service that listen on named pipes can be reached remotely If the server service is running and bound to a network adapter 73 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
74 MSRPC security: authentication RPC services: authentication ncacn_np (named pipes) Authenticated at the SMB level (SMB session authentication) But NULL sessions allow unauthenticated calls to RPC services ncacn_ip_tcp, ncadg_ip_udp Most Active Directory RPC services require authentication at the DCE RPC level Bind, Alter Context DCE RPC PDUs Legacy RPC services do not require authentication Example: MSRPC services running in the Messenger service MS security bulletin, vulnerability published by LSD 74 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
75 RPC authentication: ncacn_ip_tcp SPNEGO authentication (NTLM or Kerberos V) 75 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
76 MSRPC implementation quirks MSRPC implementation quirks Inside a given process, all RPC services can be reached using any opened endpoints! If one RPC service listens on a TCP port or a named pipe, all RPC services running in the hosting process can be reached using this endpoint Even if a RPC service only listens on a local-only transport (ncalrpc), it might be exposed to the outside Most Windows services run in shared processes (services.exe, svchost.exe) thus RPC services run by Windows services can be reached using any opened endpoint 76 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
77 services.exe RPC services: example services.exe RPC services All RPC services running inside W2K services.exe process can be reached, using either a named pipe or a UDP port as endpoint 77 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
78 RPC services protection RPC services protection RPC services exposure problem acknowledged by Microsoft New APIs: RpcServerRegisterIfEx(), RpcServerRegisterIf2() Allow specification of a security-callback function, on a per- interface basis Can be used to verify that the protocol sequence used by a client is legal Example: W2K3 lsasrv.dll: 3 RPC services use RpcServerRegisterIfEx() with a security-callback function that verifies the protocol sequence Ex: 1cbcad78-df0b-4934-b ea501c9 v0.0 (dsrole) Only reachable locally, via the dsrole LPC port 78 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
79 ncalrpc vs ncacn_np Many RPC services are locally used by Windows components ncalrpc protocol sequence However, some RPC services also listen on ncacn_np protocol sequence at the same time Not very clear why (when RPC services are not supposed to be reached remotely) Example of the File Protection Subsystem RPC service Typically a local-only RPC interface W2K and WXP endpoints: SfcApi named pipe, SfcApi LPC port Windows Server 2003 endpoint: SfcApi LPC port only It seems that Windows Server 2003 RPC services choose more carefully their protocol sequences 79 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
80 MSRPC vulnerabilities MSRPC vulnerabilities Past vulnerabilities MS01-041: Malformed RPC Request Can Cause Service Failure MS01-048: Malformed RPC Request to RPC Endpoint Mapper can Cause RPC Service to Fail (Windows NT 4.0) MS03-001: Unchecked Buffer in Locator Service Could Lead to Code Execution MS03-010: Flaw in RPC Endpoint Mapper Could Allow Denial of Service Attacks 80 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
81 MSRPC vulnerabilities, cont. MSRPC vulnerabilities Recent vulnerabilities MS03-026: Buffer Overrun In RPC Interface Could Allow Code Execution Published by the LSD research group: Vulnerability affecting RPC interfaces in the rpcss service, which opens the following endpoints 135/tcp (ncacn_ip_tcp), 135/udp (ncadg_ip_udp), \pipe\epmapper (ncacn_np), epmapper LPC port (ncalrpc) Typically exploitable via 135/tcp Other vulnerability discovered Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability Flashsky (Xfocus) 81 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
82 MSRPC vulnerabilities, cont. MSRPC vulnerabilities, cont. Recent vulnerabilities MS03-039: Buffer Overrun In RPCSS Service Could Allow Code Execution Was supposed to fix three additional vulnerabilities of RPC/ORPC services running in the rpcss service Discovered by Tenable Network Security (Xue Yong Zhi and Renaud Deraison), NSFOCUS Security Team and eeye It seems that a denial of service attack is still possible on systems with MS applied (as disussed on bugtraq@ on 2003/10/10) 82 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
83 MSRPC vulnerabilities, cont. MSRPC vulnerabilities, cont. Recent vulnerabilities MS03-043: Buffer Overrun in Messenger Service Could Allow Code Execution Published by LSD Windows Messenger service runs two RPC services, which can be used to send popup messages over MSRPC, via UDP (ncadg_ip_udp) In addition to the traditional SMB transport The RPC transport was already "exploited" to send popup spam (see Another specificity of the MSRPC implementation is that it is possible to reach a RPC service listening on ncadg_ip_udp via 135/udp See next slide 83 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
84 Messenger RPC service (ncadg_ip_udp) 84 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
85 MSRPC security: conclusion MSRPC implementation is apparently fragile..... but MSRPC is here to stay core Windows technology Possible workarounds Minimizing running RPC services Using IP filtering Including ports used by additional protocol sequences 139/tcp, 445/tcp for ncacn_np 593/tcp for ncacn_http 85 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
86 References: books Books Inside Windows Mark Russinovitch & David Salomon. Microsoft Press. Programming Windows Security.. Keith Brown. Addison Wesley DCE/RPC over SMB: Samba and Windows NT Domain Internals.. Luke Kenneth Casson Leighton. MTP Implementing CIFS.. Christopher R. Hertel. Prentice Hall / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
87 References: tools Tools Sysinternals tools Filemon, regmon, Process Exploter, PsTools, TCPView, TDIMon,... Todd Sabin's tools RPC Tools, PipeACL Tools, ACL tools Dave Aitel's SPIKE toolkit dcedump, ifids 87 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
88 Reference: Ethereal Ethereal: open-source network analyzer Simply the best network analyzer! (Unix & Windows) Windows-related protocols particularly well dissected NetBT, SMB/CIFS DCE RPC (most packet-dcerpc-* dissectors are for MSRPC interfaces) Network authentication protocols: NTLMSSP, Kerberos V (including SPNEGO) Looking at Windows network trafic is the only way to understand how Windows networks really work! 88 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
89 References: TCP/IP stack Windows TCP/IP stack Windows Network Data and Packet Filtering Microsoft Windows 2000 TCP/IP Implementation Details tcpip2k.asp 89 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
90 References: other publications Other publications Documents Windows network services internals Research paper on which this presentation is based Minimizing Windows network services Describes a possible methodology to close all TCP and UDP ports on a Windows system Presentation Windows network services for Samba folks 90 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
91 Thanks! Thanks to people working on Windows systems research! Samba community Ethereal community Security community You know who you are! 91 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
92 Questions? Thank you! 92 / 92 Copyright Hervé Jean-Baptiste Schauer Marchand Consultants HSC
Windows network services for Samba folks
Windows network services for Samba folks Jean-Baptiste Marchand Hervé Schauer Consultants 1 Agenda SMB/CIFS implementation MSRPC implementation Network authentication Interesting tools References
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand <[email protected]>
MSRPC NULL sessions Exploitation and protection Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda - 2 - Introduction to NULL sessions NULL sessions internals Tools to
Active Directory network protocols and traffic
samba experience 2005 Göttingen, Germany 4 th May 2005 Active Directory network protocols and traffic Jean-Baptiste Marchand Jean-Baptiste Marchand Introduction Agenda Active
Active Directory network protocols and traffic
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Windows Security OSSIR group 13th September S 2004 Active Directory
Fingerprinting Through RPC
Fingerprinting Through RPC Hidenobu Seki [email protected] Agenda Information gathering for RPC troubleshooting Microsoft RPC Interface IDs of Windows RPC services Info gathering without authentication
Nessus scanning on Windows Domain
Nessus scanning on Windows Domain A little inside information and Nessus can go a long way By Sunil Vakharia [email protected] Version 1.0 4 November 2003 About this paper This paper is not a tutorial
Understanding MAPI. Julien Kerihuel, <[email protected]>
Understanding MAPI Julien Kerihuel, Contents Introduction MAPI Overview MAPI Concepts Introduction Introduction This introduction provides a quick overview of the underlying
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
Solaris CIFS Service CIFS. Alan Wright [email protected]
Solaris CIFS Service CIFS Alan Wright [email protected] Solaris CIFS Service Windows Interoperability opensolaris First-class Solaris Citizen kernel based protocol (a la NFS) file system (vfs and zfs) support
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
Samba and Vista with IPv6
Samba and Vista with IPv6 Dr David Holder CEng MIET MIEEE [email protected] - All rights reserved Quick Poll Who is using IPv6? Who is using IPv6 in a production environment? Who wants to use IPv6
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Metasploit Beginners
Metasploit Beginners #.. # # _/ \ _ \ _/ # # / \ \\ \ / // \/ /_\ \ / / \ # # / /_/ / \ \/ \ /\ \ \ # # \/ \/ \/ # # # # _/ \ \_/ \ \/ \/ / # # \ \ \/\ /\ / # # \
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak CR V4.1 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
The Win32 Network Management APIs
The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
Web. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
OV Operations for Windows 7.x
OV Operations for Windows 7.x Common questions about OV Operations for Windows Security Setup, Users and groups Whitepaper V.1.01 August 6, 2003 New: Updated for OV Operations for Windows 7.20 Troubleshoot
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
SerNet. Samba Status Update. Linuxkongress Hamburg October 10, 2008. Volker Lendecke SerNet Samba Team. Network Service in a Service Network
Samba Status Update Linuxkongress Hamburg October 10, 2008 Volker Lendecke SerNet Samba Team 10/2008, Volker Lendecke, SerNet Service Network GmbH, Seite 1 Volker Lendecke Co-founder SerNet - Service Network
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Windows Assessment. Vulnerability Assessment Course
Windows Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Windows Security Overview
imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000
English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2
About Microsoft Windows Server 2003
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
HP OpenView Operations 7.x for Windows. Firewall Configuration white paper. Version 2.2. Publication Date: 08/2003
HP OpenView Operations 7.x for Windows Firewall Configuration white paper Version 2.2 Publication Date: 08/2003 Warranty Information The information contained in this document is subject to change without
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DR V2.0 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents Table of Contents
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!
Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:
Security Guide for ActiveRoles Server 6.1
Security Guide for ActiveRoles Server 6.1 Written by Einar Mykletun, Ph.D Security and Compliance Architect Quest Software, Inc. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document
UNCLASSIFIED. BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23)
BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23) March 2007 This page intentionally left blank. March 2007 Foreword The BlackBerry Enterprise Server Isolation in a Microsoft
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Charles Firth [email protected]. Managing Macs in a Windows World
Charles Firth [email protected] Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
Introduction to PsPing - a new Microsoft Windows tool for measuring network performance. Bartek Gajda [email protected]
Introduction to PsPing - a new Microsoft Windows tool for measuring network performance Bartek Gajda [email protected] Sysinternals Suite Sysinternals Suite is a set of advanced system utilities for
Hardening IIS Servers
8 Hardening IIS Servers Overview This chapter focuses on the guidance and procedures required to harden the IIS servers in your environment. To provide comprehensive security for Web servers and applications
Service Name Startup Type Log On As. ActiveX Installer (AxInstSV) Manual Local System. Adaptive Brightness Manual Local Service
Did you tweak the Services configuration incorrectly, resulting in a system slowdown or leading to other catastrophe? And you don t remember the original configuration to revert back? You may find the
EMC VNX Series. Configuring and Managing CIFS on VNX. Version VNX1, VNX2 P/N 300-014-332 REV. 03
EMC VNX Series Version VNX1, VNX2 Configuring and Managing CIFS on VNX P/N 300-014-332 REV. 03 Copyright 1998-2015 EMC Corporation. All rights reserved. Published in USA. Published March, 2015 EMC believes
Managing Celerra for the Windows Environment
Managing Celerra for the Windows Environment P/N 300-002-679 Rev A01 March 2006 Contents Introduction..................................................3 Windows and multiprotocol documentation....................3
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION Date: April 22,2013 Prepared by: Sainath K.E.V Microsoft Most Valuable Professional Introduction: SKV Consulting is a Premier Consulting
This document describes the methodology used for validating the model, analysis, comments and test results from the model s application.
Ernst & Young LLP Security & Technology Solutions Advanced Security Center Using Attack Surface Area And Relative Attack Surface Quotient To Identify Attackability Customer Information Paper TABLE OF CONTENTS
Configuring and Managing CIFS on VNX
EMC VNX Series Release 7.0 Configuring and Managing CIFS on VNX P/N 300-011-826 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 1998-2011 EMC
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
Actuality of SMBRelay in Modern Windows Networks
Actuality of SMBRelay in Modern Windows Networks Ares, April 2012 [email protected] http://sniff.su Intro I first came across SMBRelay in the middle of 2000s and the experience was unsatisfying..
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Belarc Advisor Security Benchmark Summary
Page 1 of 5 The license associated with the Belarc Advisor product allows for free personal use only. Use on multiple computers in a corporate, educational, military or government installation is prohibited.
OPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
FreeIPA Cross Forest Trusts
Alexander Bokovoy Andreas Schneider May 10th, 2012 1 FreeIPA What is FreeIPA? Cross Forest Trusts 2 Samba 3 Demo Talloc Tutorial Pavel Brezina wrote Talloc tutorial! http://talloc.samba.org/
Roles for Servers in the SCW Database
Roles for Servers in the SCW Database Application BizTalk 2004 Business Activity BizTalk 2004 Messaging and Orchestration ASP.NET session state BizTalk 2004 EDI Integration BizTalk 2004 Rules Engine Audit
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver 8021-8022 TCP/UDP
TCP/IP ports that might be used with Canon office equipment (in alphabetical order) 3/1/2009 Axis Print server. This port is used to identify the status the axis print server. This is performed approx
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Securing Your Network. The Art of Attack & Penetration
Securing Your Network The Art of Attack & Penetration Erik Pace Birkholz Special Ops Security Eric Schultze Shavlik Technologies Session Objectives Discuss common DMZ and host configuration weaknesses
DCOM settings for computer-to-computer communication between OPC servers and OPC clients
DCOM settings for computer-to-computer communication between OPC servers and OPC clients 1. Introduction Under OPC DA, the "dcomcnfg" service program is used for computer-to-computer communication between
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.46 Configuring and Managing CIFS on EMC Celerra P/N 300-007-526 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)
Kepware Technologies Remote OPC DA Quick Start Guide (DCOM) March, 2013 Ref. 03.10 Kepware Technologies Table of Contents 1. Overview... 1 1.1 What is DCOM?... 1 1.2 What is OPCEnum?... 1 2. Users and
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations Security Considerations for VPM and HP SIM Servers Introduction... 3 External patch acquisition... 4 Comparing
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Implementing Active Directory Hurdles, Obstacles, and the Finish Line. Jim McDonough Samba Team IBM Linux Technology Center April 6, 2004
Implementing Active Directory Hurdles, Obstacles, and the Finish Line Jim McDonough Samba Team IBM Linux Technology Center April 6, 2004 IBM Interest Alternative to Active Directory Common request from
REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY
- 8 JATIT. All rights reserved. REMOTE ADMINISTRATION TOOLS: A COMPARATIVE STUDY Anis Ismail, Mohammad Hajjar, Haissam Hajjar Department of Computer Network and Telecommunications Engineering University
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes
Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes Compass Security AG, Daniel Stirnimann Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel +41 55-214 41 60 Fax +41
VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink [email protected]
VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink [email protected] Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
Successful DB2 NETLOGON in LAB (Sniffer on LAB HUB)
Troubleshooting Analysis for Windows 2000 Active Directory Authentication Problem Overview Servers DB1 & DB2 are configured with clustering (DB1 is active and DB2 is backup). The PDC (server NT9) is connected
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
Windows security for n00bs part 1 Security architecture & Access Control
Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows
SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO
SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO Lucas Morris Michael McAtee @lucasjmorris @michael.mcatee About Us Lucas Morris Manager at Crowe Horwath LLP Manager, Pentester, Code Monkey Michael McAtee
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Colubris TechNote. Testing and Troubleshooting Active- Directory. Revision 1.3 Mar. 2008 Author: Dave Leger
Colubris TechNote Testing and Troubleshooting Active- Directory Revision 1.3 Mar. 2008 Author: Dave Leger Colubris Networks 200 West St. Suite 300 Waltham, MA 02451 www.colubris.com Page 1 Contents OBJECTIVE...
How To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
Burst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
Overview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
