Basic principles of infrastracture security Impersonation, delegation and code injection



Similar documents
Web Application Proxy

CERTIFICATES AND CRYPTOGRAPHY

Modeling your infrastructure with SCOM

TIBCO Spotfire Platform IT Brief

ACTIVE DIRECTORY OVERVIEW

SAML-Based SSO Solution

Enabling single sign-on for Cognos 8/10 with Active Directory

Windows Assessment. Vulnerability Assessment Course

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Securing Active Directory Correctly

16) INFORMATION SECURITY INCIDENT MANAGEMENT

Pass-the-Hash: How Attackers Spread and How to Stop Them

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Security IIS Service Lesson 6

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Penetration Testing - a way for improving our cyber security

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Internal Penetration Test

Lesson Plans Administering Security in a Server 2003 Network

Securing ArcGIS Server Services: First Steps

SCOM Infrastructure Recap

Windows servers. NT networks

Microsoft Active Directory and Windows Security Integration with Oracle Database

Copyright

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP

Configuring IBM Cognos Controller 8 to use Single Sign- On

qliqdirect Active Directory Guide

Guide to SASL, GSSAPI & Kerberos v.6.0

Web. Security Options Comparison

Agenda. How to configure

Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Mobile Security. Policies, Standards, Frameworks, Guidelines

ADFS and Web Application Proxy

Mechanics of User Identification and Authentication

Setup Corporate (Microsoft Exchange) . This tutorial will walk you through the steps of setting up your corporate account.

Windows Server 2008/2012 Server Hardening

Managing Local Administrator Passwords with LAPS 10/14/2015 PENN STATE SECURITY CONFERENCE

How To Secure Your Data Center From Hackers

Active Directory & SQL Server

SAML-Based SSO Solution

CS 356 Lecture 28 Internet Authentication. Spring 2013

Getting a handle on SharePoint security complexity

Charles Firth Managing Macs in a Windows World

Configuring Authentication for Microsoft Windows

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

7.1. Remote Access Connection

Windows passwords security

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security and Kerberos Authentication with K2 Servers

Configuring Sponsor Authentication

How to Secure a Groove Manager Web Site

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Configuration of Kerberos Constrained Delegation On NetScaler Revision History

Secret Server Qualys Integration Guide

Secure Web Access Solution

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

Directory and File Transfer Services. Chapter 7

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Azure Active Directory

Working with Structured Data in Microsoft Office SharePoint Server 2007 (Part1): Configuring Single Sign On Service and Database

Xerox DocuShare Security Features. Security White Paper

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell

Virtualization and Cloud Computing

Preliminary Course Syllabus

NETWRIX PASSWORD MANAGER

Web Interface with Active Directory Federation Services Support Administrator s Guide

ecopy ShareScan v4.3 Pre-Installation Checklist

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Belarc Advisor Security Benchmark Summary

Hardening Security in ASP.NET Applications & Services. Rick G. Garibay

Operating System Security

Colligo Engage Windows App 7.0. Administrator s Guide

mimikatz 2.0 Benjamin DELPY `gentilkiwi`

Okta/Dropbox Active Directory Integration Guide

Hosts HARDENING WINDOWS NETWORKS TRAINING

Criteria for web application security check. Version

SSO Plugin. Release notes. J System Solutions. Version 3.6

Authentication and Single Sign On

Single Sign-on (SSO) technologies for the Domino Web Server

Why You Need to Detect More Than PtH. Matt Hathaway, Senior Product Manager, Rapid7 Jeff Myers, Lead Software Engineer, Rapid7

Centralized Oracle Database Authentication and Authorization in a Directory

Entrust Managed Services PKI

Juniper Networks Secure Access Kerberos Constrained Delegation

Microsoft Solutions for Security and Compliance Microsoft Identity and Access Management Series

Installing SQL Server Express 2008 Version /08/05 sdk

Eylean server deployment guide

Windows XP Exchange Client Installation Instructions

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

How-to: Single Sign-On

JVA-122. Secure Java Web Development

IceWarp Server - SSO (Single Sign-On)

CAC/PIV PKI Solution Installation Survey & Checklist

Transcription:

Basic principles of infrastracture security Impersonation, delegation and code injection Ondřej Ševeček GOPAS a.s. MCM: Directory Services MVP: Enterprise Security CHFI CEH CISA ondrej@sevecek.com www.sevecek.com

Agenda Service accounts Single sign on (SSO) Impersonation Delegation

Motivation where most admins do critical mistakes pass-the-hash is not the problem understand and bind to correct procedures GOC172 - Kerberos troubleshooting GOC169 - Auditing ISO 2700x

SSO (single-sign-on) Minimize use of secure authentication information ISO/IEC 27001 Limits password/pin exposure Limits user's incentives to store passwords on local systems or write them down

Authentication methods in Windows Password single factor stored in AD or local SAM database as hash NTLM, Kerberos, AD LDAP simple bind, Digest Smart card multi factor PKI certificate's private key mapped to AD user account AD Kerberos only Certificate single factor if not stored in smart card PKI certificate's private key mapped to AD user account TLS/SSL client certificate authentication (SCHANNEL)

Network authentication against AD Basic full-text password sent over clear/encrypted channel HTTP basic, LDAP simple bind, RDP SSO, CredSSP NTLM hashed password with random challenge LM, NTLM/MS-CHAP, NTLMv2/MS-CHAPv2 Kerberos hashed password encrypted timestamp private key signature of timestamp (PKINIT) TLS/SSL client certificate authentication private key signature of server's challenge HTTPS, EAP-TLS, AD FS Digest MD5 hashed password with random challenge HTTP digest, CHAP, LDAP

Network authentication Client Secure Channel

Delegation (double-hop) Client Back-end

Network authentication risks Clear text password? Client Weak password hash? Impersonation

Network authentication risks Client Clear text password? Weak password hash? Delegation Back-end Impersonation

Service Accounts Services, jobs and IIS application pools run under some service identity NT AUTHORITY\System NT AUTHORITY\Network Service NT AUTHORITY\Local Service NT SERVICE\* IIS APPPOOL\* <domain>\* GOC172 - Kerberos troubleshooting GOC175 - Advanced Windows security

Service identities on Windows XP+ SYSTEM local Administrators uses COMPUTER$ to access network resources must use Kerberos on 2003- (cannot use NTLM) 2008+ Allow Local System to use computer identity for NTLM Network Service local Users uses COMPUTER$ to access network resources Local Service local Users anonymous network access

NT SERVICE

IIS APPPOOL

Isolation Domain Account Network Password Groups Local Isolation Network Isolation Kerberos PAC Validation OS NT AUTHORITY SYSTEM automatic 30 days Administrators no MACHINE$ no 2000 NT AUTHORITY Network Service automatic 30 days Users no MACHINE$ no XP NT AUTHORITY Local Service no Users no anonymous no XP NT SERVICE <servicename> automatic 30 days IIS APPPOOL <apppoolname> automatic 30 days Users yes MACHINE$ no Vista 2008 Users yes MACHINE$ no Vista 2008 <domain> <username> manual Users yes yes yes 2000 <domain> <managedsvcaccount> automatic 30 days <domain> <groupsvcaccount> automatic 30 days Users yes yes no 7 2008 R2 Users yes yes no 8 2012

Impersonation and Access Token local groups/sids LSASS Kerberos groups credentials Access Token Outlook IE Explorer In-band transport HTTP, SMB, OM SmbSrv WebSrv SQL Exch Client NTLM groups SChannel groups DB Registry NTFS LSASS AD

User right: Impersonate client after authentication (SeImpersonatePrivilege)

Basic delegation LSASS password Client password Kerberos Back-end

Kerberos unconstrained delegation (2000+) LSASS F:TGT Client F:TGT Kerberos Back-end

Kerberos constrained delegation (2003+) LSASS nothing Client TGS Kerberos Back-end

Kerberos protocol transition (2003+) LSASS nothing Client anything NTLM Kerberos Back-end retina questions

Děkuji za pozornost! GOC172 - Kerberos troubleshooting GOC175 - Advanced Windows security GOC172 - Kerberos troubleshooting GOC169 - Auditing ISO 2700x Ondřej Ševeček GOPAS a.s. MCM: Directory Services MVP: Enterprise Security CHFI CEH CISA ondrej@sevecek.com www.sevecek.com