Five Steps to Improve Internal Network Security. Chattanooga ISSA



Similar documents
Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Security Considerations White Paper for Cisco Smart Storage 1

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Internal Penetration Test

IT HEALTHCHECK TOP TIPS WHITEPAPER

Security. TestOut Modules

Setting Up Scan to SMB on TaskALFA series MFP s.

Penetration Testing Report Client: Business Solutions June 15 th 2015

Windows Operating Systems. Basic Security

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

NAS 109 Using NAS with Linux

Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)

Secret Server Qualys Integration Guide

Activity 1: Scanning with Windows Defender

SCP - Strategic Infrastructure Security

IIS, FTP Server and Windows

Remote Administration

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Using Remote Desktop to access your Office Computer or Faculty Remote Desktop Server August, 2005 This document consists of two main parts and an

Microsoft Baseline Security Analyzer

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Guidelines for MapInfo Discovery 1.1

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

How To - Implement Single Sign On Authentication with Active Directory

Discovering passwords in the memory

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Codes of Connection for Devices Connected to Newcastle University ICT Network

DiamondStream Data Security Policy Summary

Connecting to the FILTER Virtual Private Network (VPN)

Kaseya Server Instal ation User Guide June 6, 2008

Security IIS Service Lesson 6

Lab 9: Pen Testing (NESSUS)

Workflow Templates Library

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

A Guide to New Features in Propalms OneGate 4.0

CTS2134 Introduction to Networking. Module Network Security

GFI White Paper PCI-DSS compliance and GFI Software products

!!!!!!!!!!!!!!!!!!!!!!

Hosts HARDENING WINDOWS NETWORKS TRAINING

How to Backup XenServer VM with VirtualIQ

Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide

RemotelyAnywhere Getting Started Guide

Penetration Test Report

Freshservice Discovery Probe User Guide

Shellshock Security Patch for X86

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

SQL Server Hardening

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Microsoft Baseline Security Analyzer (MBSA)

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

About Microsoft Windows Server 2003

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Using MailStore to Archive MDaemon

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Management, Logging and Troubleshooting

ADSelfService Plus Client Software Installation Guide

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

FileCloud Security FAQ

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

Chapter 2 Editor s Note:

Training module 2 Installing VMware View

TestElite - Troubleshooting

How to Secure a Groove Manager Web Site

Sysax Multi Server User manual

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Configuring Security for FTP Traffic

Configuring the WT-4 for ftp (Ad-hoc Mode)

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

Enabling Active Directory Authentication with ESX Server 1

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

File Services. File Services at a Glance

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

FORENSIC ARTIFACTS FROM A PASS THE HASH (PTH) ATTACK BY: GERARD LAYGUI

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Locking down a Hitachi ID Suite server

Click Studios. Passwordstate. Installation Instructions

Deployment of Keepit for Windows

Network and Security Controls

ScanRouter Lite

Web Plus Security Features and Recommendations

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Vulnerability Assessment and Penetration Testing

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Web Security School Entrance Exam

Web. Security Options Comparison

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

System Security Policy Management: Advanced Audit Tasks

Transcription:

Five Steps to Improve Internal Network Security Chattanooga ISSA 1

Find Me AverageSecurityGuy.info @averagesecguy stephen@averagesecurityguy.info github.com/averagesecurityguy ChattSec.org 2

Why? The methodical workflow honed by many state-affiliated actors of setting up a backdoor to gain initial access, and then using shell services to move laterally through the organization, has proven to be successful against victims of all types and sizes. 2013 Data Breach Investigations Report p.36 3

What? 1. Eliminate LanMan Hashes 2. Remove Shared Local Admin Passwords 3. Lockdown Open File Shares 4. Replace Default/Blank Passwords 5. Lockdown Remote Desktop Protocol 4

Eliminate LanMan Password Hashes 5

Eliminate LanMan Hashes LanMan is a weak hashing algorithm, which only works on passwords of 14 characters or less. The password is converted to upper case and split into two easily cracked 7 character chunks. Tools such as Ophcrack, Rcracki_mt, John the Ripper, and Hashcat can crack LM hashes very quickly. 6

7

Eliminate LanMan Hashes Group Policy 1. Open Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options 2. Network security: Do not store LAN Manager hash value on next password change. 8

Eliminate LanMan Hashes Local Machine 1. HKEY_LOCAL_MACHINE\SYSTEM \CurrentControlSet\Control\Lsa 2. Add DWORD NoLMHash 3. Set the value to 1 9

Eliminate LanMan Hashes Unfortunately, these changes only mean LM hashes are not saved to disk. Windows still calculates the LM hashes and stores them in memory, which means they can still be extracted and cracked using tools like Windows Credential Editor (WCE). The only way to completely remove LM hashes is to use passwords of 15 characters or more. 10

Side Note: Mimikatz Authentication algorithms such as HTTP Digest and Kerberos require knowledge of the plaintext password so Windows stores it in memory in encrypted form. The password can be easily decrypted to recover the plaintext password. Mimikatz finds and decrypts these passwords. 11

Side Note: Mimikatz The only way to protect against Mimikatz is to not logon interactively with privileged accounts. W h e n i n t e r a c t i n g w i t h a compromised machine, use WMIC, PSExec, or Net commands. 12

Remove Shared Local Admin Passwords 13

Remove Shared Local Admin Passwords It is very common for the same local administrator password to be used throughout an organization. Once an attacker has the shared password he has control of a large portion of the organization. 14

15

Remove Shared Local Admin Passwords Make sure the local administrator account and the domain administrator account use unique passwords. 16

Remove Shared Local Admin Passwords Use a unique password for each local administrator account. Deny network logons for the local administrator account. 17

Lockdown Open File Shares 18

Lock Down Open File Shares Open file shares are an excellent source of sensitive data. Windows shared folders, NFS shared folders, and anonymous FTP servers are the most common source of open file shares. Tools like Nmap, Nessus, or Metasploit can be used to find open shares. 19

Lock Down Open File Shares At one client the primary file server had many open shares, some of which contained protected health information. Other shares contained the source code to the client s web site, including database credentials. 20

Lock Down Open File Shares At another client, a user shared files with Windows Simple File Sharing in Windows XP. The shared folder contained a document that included passwords for the company Facebook account and donor mailing list. 21

22

23

24

25

Lock Down Open File Shares 1. Open Folder Options 2. Go to the View tab 3. Uncheck Use Simple File Sharing 4. View the Properties for a Folder 5. Go to the Sharing tab and set the permissions to Everyone Full Control 6. Go to the Security tab and set appropriate NTFS permissions. 26

Lock Down Open File Shares 1. Edit /etc/exports to ensure only appropriate directories are listed. 2. For each directory, grant access to only the appropriate IP addresses. 3. For each IP address, ensure read/write permissions are set correctly. 4. Ensure root is squashed. 27

Replace Default/Blank Passwords 28

Replace Default/Blank Passwords Blank sa passwords in MSSQL can lead to full machine compromise. Blank local administrator passwords allow full machine compromise. Default/blank passwords on web-based management interfaces lead to various levels of compromise. 29

30

31

32

33

34

35

Replace Default/Blank Passwords There is no automated method for fixing this issue. Vulnerability scanners cannot identify all instances of default/blank passwords but can identify a number of them. 36

Replace Default/Blank Passwords 1. Scan the network for HTTP, FTP, Telnet, and SSH services. 2. Disable any services that are not needed. 3. Ensure a strong password is used on any services that are not disabled. 37

Replace Default/Blank Passwords http://www.phenoelit.org/dpl/dpl.html http://cirt.net/passwords http://www.virus.org/default-password 38

Lockdown Remote Desktop Protocol 39

Lockdown Remote Desktop Protocol RDP is used throughout many organizations to remotely administer internal machines and is typically configured with no restrictions other than username and password. 40

Lockdown Remote Desktop Protocol The Morto worm scans a network for machines running RDP and attempts to login using the administrator account and a list of weak passwords. After it logs in, it copies itself to the new machine, searches for other vulnerable machines, and calls back to a C&C server to await commands. 41

Lockdown Remote Desktop Protocol The update in MS12-020 fixes a vulnerability in RDP, which is present in all versions of Windows. Newer versions of RDP use network level authentication (NLA), which requires an attacker to authenticate to the server before connecting to the RDP service, but this does not fix the underlying vulnerability. The only fix is to apply the update. 42

Lockdown Remote Desktop Protocol Disable RDP with Group Policy (Server 2003) 1. Open Computer Configuration -> Administrative Templates -> Windows Components -> Terminal Services 2. Set Allow users to connect remotely using Terminal Services to disabled. 43

Lockdown Remote Desktop Protocol Disable RDP with Group Policy (Server 2008) 1. Open Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Connections 2. Set Allow users to connect remotely using Remote Desktop Services to disabled. 44

Lockdown Remote Desktop Protocol Additional Controls 1. Use Windows Firewall to restrict access by IP address. 2. Use Group Policy to restrict access to specific users. 45

Recap 1. Eliminate LanMan Hashes 2. Remove Shared Local Admin Passwords 3. Lockdown Open File Shares 4. Replace Default/Blank Passwords 5. Lockdown Remote Desktop Protocol 46

Additional Resources - http://computer-forensics.sans.org/blog/2012/03/09/protectingprivileged-domain-accounts-disabling-encrypted-passwords - http://computer-forensics.sans.org/blog/2012/02/21/protectingprivileged-domain-account-safeguarding-password-hashes - http://support.microsoft.com/kb/306300 (Disable RDP Server 2003) - http://www.reborndigital.com/?p=88 (Disable RDP Server 2008) 47

Five Steps to Improve Internal Network Security Chattanooga ISSA 48