Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.

Slides:



Advertisements
Similar presentations
Preparing for Installation Reviewing the list of tasks Working with DNS Recording information Backing up files Uncompressing the drive Disabling disk mirroring.
Advertisements

Password Cracking Lesson 10. Why crack passwords?
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Module 1: Installing Windows XP Professional
Password CrackingSECURITY INNOVATION © Sidebar – Password Cracking We have discussed authentication mechanisms including authenticators. We also.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 4 Chapter 4: Planning the Active Directory and Security.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Network Shares and Accounts Sharing Printers, Drives, Folders – Setup Windows 95/98 Windows NT (2000, XP) Linux – Users – Groups.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Hacking Windows 2K, XP. Windows 2K, XP Review: NetBIOS name resolution. SMB - Shared Message Block - uses TCP port 139, and NBT - NetBIOS over TCP/IP.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Working with Workgroups and Domains
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
The Truth About Protecting Passwords COEN 150: Intro to Information Security Mary Le Carol Reiley.
Chapter 4 System Hacking: Password Cracking, Escalating Privileges, & Hiding Files.
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
CIS 450 – Network Security Chapter 8 – Password Security.
SAMBA Integrating Linux and Window. What is Samba? Free suite of programs that enables flavors of UNIX to work with other operating systems such as OS/2.
Troubleshooting Windows Vista Security Chapter 4.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
Chapter 3 Installing Windows XP Professional. Preparing for installation Pre-installation requirement; ◦ Hardware requirements ◦ Hardware compatibility.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
FORESEC Academy FORESEC Academy Security Essentials (V)
Module 1: Installing Microsoft Windows XP Professional.
NT4 SP4 Security Jack Schmidt - Fermilab
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Chapter 10: Rights, User, and Group Administration.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Hacking Windows What to do first?  Patch : of course the first thing to do is apply SP3 and the critical updates. More will come …critical updates.
TCOM Information Assurance Management System Hacking.
NetTech Solutions Supporting Local Users and Groups Lesson Three.
NetTech Solutions Security and Security Permissions Lesson Nine.
Password cracking Patrick Sparrow, Matt Prestifillipo, Bill Kazmierski.
System Hacking (Gaining Access) Additions to CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
Understanding Security Policies Lesson 3. Objectives.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Hacking Windows.
I have edited and added material.
Introduction to Operating Systems
Password Cracking Lesson 10.
Active Directory Administration
Lesson 16-Windows NT Security Issues
Florida State University
Presentation transcript:

Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen C. Hayne

Service Packs and Hot Fixes Hot Fixes Upgrades to fix specific problems Such as programming flaws Service Packs Upgrades to fix problems within Windows Like security flaws Such as IP spoofing Contain a number of Hot Fixes

Domains And File Sharing Domains – Grouping Machines Together PDC – Primary Domain Controller Contains information about user accounts BDC – Backup Domain Controller Emergency copy of the PDC File Sharing – Accessing Resources across the Network \\xxxxx\zzz Where xxxxx is the computer name, and zzz is the shared folder Use $ after the name of the folder to make it hidden

User Groups Local Groups Administrators (Local) Account Operators Server Operators Backup Operators Print Operators Replicator Users Guests Global Groups Domain Administrators Domain Users

Windows File Systems FAT Standard file system Offers no access control NTFS Has many more different access permissions Makes securing files easier Most importantly, DOS can not view NTFS partitions

NTFS Permissions Standard Permissions No Access User can’t do anything Read User can read and execute Change User can read, write, execute, and delete Full Control User can change permissions for other users, Take Ownership, and have full access Special Permissions Read only Execute Write Delete Change Permissions Take Ownership

Windows Security Local Security Authority (LSA) Determines whether a logon attempt is valid Security Accounts Manager (SAM) Receives user logon information and checks it with its database to verify a correct username/password SAM Database Stores the LM and NT password hashes

Windows Passwords LM Password Used for backward compatibility Stores passwords in CAPS Much easier to crack than NT Hashes Password is not hashed or encrypted Broken up into 2 groups of 7 characters Usually gives away the NT password if cracked NT Password Used for compatibility with Windows NT/2000 systems Stores password exactly how they were entered by the user Uses a series of 2 one way hashes to hash the password Does not salt passwords like Unix

Windows “NT” Passwords Length Anywhere from 0 to 14 characters Characters All letters (upper and lowercase), numbers, and symbols are acceptable Stored in SAM database \WINNT\system32\config or \WINNT\repair …

NT Passwords 1. Hashed using RSA MD4 function Not reversable! But can be replicated… 2. Hashed again using MS function into SAM Reversable and fairly simple 3. Encrypted using Syskey function Strong encryption of SAM on disk

LM Passwords VS. NT Passwords An 8 character LM password is 890 times easier to crack than an 8 character NT password A 14 character LM password is 450 trillion times easier to crack than a 14 character NT Password 450 trillion = 450,000,000,000,000

Password Reset Offline NT Password & Registry Editor

Active Directory All important Based on Lightweight Directory Access Protocol an extensible, vendor-independent, network protocol standard -- it supports hardware, software, and network heterogeneity for any kind of data

LDAP (Active Directory)

Active Directory Creates a a hierarchy of trusted Organizational Units User profiles are verified with controlling server and can be set up to “roam” (huge data transfers) Passwords stored in “ntdis.nit” database or in SAM file (regular OS)

Windows Cracking Obtain copy of SAM and run L0phtCrack BUT – can’t get “real” SAM if system uses Active Directory UNLESS, use PWDUMP3 first…

NTFSDos and SAMDump NTFSDos Utility that allows DOS to view NTFS partitions Can be placed on a boot disk and used to access files that can’t be accessed in Windows SAMDump Utility that “dumps” the password hashes in the SAM database Can be used to view the password hashes or to export them into a text file If Syskey is used, displayed hashes will be incorrect

PWDump3 A utility similar to SAMDump Grabs password hashes from memory instead of the SAM database Because of this, it will work with Syskey enabled Can only be used by the Administrator on each system

L0phtCrack Uses Dictionary, Hybrid, and Brute Force attacks on password hashes Can get password from a local machine, a repair disk, a copied SAM file, or over a network (By sniffing packets) Can only be used by users who have Administrator status Uses a built in version of PWDump3 to access the password hashes from memory

Password Protection 1. Remove permissions from the “repair” file 2. Audit Password Registry Keys 3. Use a strong Admin password and DON’T share it! 1. characters – increases key space 100 times 2. Possibly add characters from [Alt+###]

Security Administrative Settings Local Security Policy – when unjoined… Disable weaker LM authentication if no 95/98 machines on network “runas” utility Kerberos! EFS (DES) doesn’t apply across the net EFS

Un*x Cracking Obtain “John the Ripper” Run against /etc/passwd file