Passwords Everywhere GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP:

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

GOPAS TechEd 2012 PKI Design Ing. Ondřej Ševeček | GOPAS a.s. |
Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | | |
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
Ing. Ondřej Ševeček | GOPAS a.s. | MCSM:Directory | MVP:Enterprise Security | CEH:Certified Ethical Hacker | CHFI:Computer Hacking Forensic Investigator.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 2 Operating System Security Fundamentals.
Kerberos Underworld Ondrej Sevecek | MCM: Directory | MVP: Security |
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Ing. Ondřej Ševeček MCSM:Directory | MVP:Enterprise Security | Certified Ethical Hacker | MCSE:SharePoint | Smart card.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | Certified Ethical Hacker | |
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
MS systems use one of the following: LanManager Hash (LM) LanManager Hash (LM) NT LanManager (NTLM) NT LanManager (NTLM) Cached passwords Cached passwords.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Bezpečnost Windows pro pokročilé: uživatelské účty GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
What would a real hacker do to your AD GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Security Planning and Administrative Delegation Lesson 6.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 4 Profiles, Password Policies, Privileges, and Roles.
What is new in security in Windows 2012 or Dynamic Access Control Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
SQL Server Security By Mattias Lind For PASS Security VC.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
System Hacking Active System Intrusion. Aspects of System Hacking System password guessing Password cracking Key loggers Eavesdropping Sniffers Man in.
Ing. Ondřej Ševeček | | | MCM:Directory | MVP:Security | MCSE:Windows2012 | MCSE:SharePoint | MCT | Certified Ethical.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Bezpečnost Windows pro pokročilé: přístup do sítě GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM:Directory.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Operating System Security Fundamentals Dr. Gabriel.
Advanced Accounting Information Systems Day 23 Operating Systems Security October 16, 2009.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | CEH | | |
Bezpečnost Windows pro pokročilé: zajímavosti a UAC GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. |
Ing. Ondřej Ševeček MCSM:Directory | MVP:Enterprise Security | Certified Ethical Hacker | MCSE:SharePoint | Event Filtering.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Bezpečnost Windows pro pokročilé: protokoly a sledování přihlášení GOPAS: | | Ing. Ondřej Ševeček.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
Ing. Ondřej Ševeček MCSM:Directory | MVP:Enterprise Security | Certified Ethical Hacker | MCSE:SharePoint | Passwords.
Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | facebook: ondrej.sevecek.official.
Implementing SSTP VPN and 802.1x with RADIUS on Windows 2012 Ing. Ondřej Ševeček | Product Manager Windows Server | GOPAS a.s. MCM: Directory | MVP: Security.
Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | Enterprise certification.
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
Ing. Ondrej Sevecek MCSM:Directory2012 | MVP:Security | CEH | MCSE:Windows2012 | What would a real hacker do to your AD.
Secure Connected Infrastructure
What is new in security in Windows 2012 or Dynamic Access Control
Enabling Secure Internet Access with TMG
Passwords Everywhere Ing. Ondřej Ševeček | GOPAS a.s. |
Configuring and Troubleshooting Routing and Remote Access
SharePoint and IIS core integration
Security.
Security Planning and Administrative Delegation
GOPAS TechEd 2012 Kerberos Delegation
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Passwords Everywhere GOPAS: | | Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | Certified Ethical Hacker | | |

Take care of your passwords  People use the same passwords for different services AD network, mobile phone, credit card PIN, facebook, e- shops, fre , …  People type their passwords on unknown computers  Passwords travel over network unencrypted  Somebody else is your computer administrator  Computers store passwords often in full form

Hardware keyloggers  Easy soldier

Different service = different password?  Do you thing the databases of facebook, google+, gmail, microsoft, alza, seznam, … are encrypted? nonsense  What do you thing the Indians do when bored? are they surfing your , or facebook?  What do you thing is the first thing a virus is going to do after infection? list all user accounts touch anything in your network with your current password

User Account Control (UAC)  Locally limits Administrators group membership  Does nothing over network  It matters only for a BFU on a single machine  It does not affect administrative accounts

Windows authentication seems secure  Kerberos, Kerberos, Kerberos, sometimes NTLM  Encrypted network transport AES, mutual authentication, rekeying, etc.

Passwords are in memory Internet Explorer Outlook Lync Ctrl-Alt-Del LSASS IS Client plaintext password

Server Passwords are in LSASS memory Internet Explorer Outlook Lync Local LSASS Server LSASS Kerberos NTLM IS Client plaintext password

Who can steal passwords from LSASS  Local Administrators Debug privilege is just the only necessary to break into LSASS memory

Basic authentication  HTTP Basic authentication used veeeeery often even on intranets mostly BFU accounts  LDAP Simple bind used veeeeery often by third-party NAS, VPN, VoIP, gateways, routers, VMWare console, etc. often administrative accounts  RDP used extreeeeemely often extreeeeemely often administrative accounts

Server Passwords are in LSASS memory Internet Explorer Outlook Lync Server LSASS plain-text IS Client MSTSC plaintext password VPN

Passwords are stored in full form  IIS application pools  Services  Scheduled tasks

After attack, change your password!  Really?  Password filter on DC or on local SAM database

Good password  Long at least 12 characters  All four types of characters (a-z, A-Z, 0-9, #$%^…) 80% passwords are alfa-numeric  Never reuse the same password for critical services not too much change necessary

Password locking?  Do not exagerate 6 characters complex password 75 trials per one lock for 1 minute = years

Cracking from local/AD hashes (non-cache)  MD4 hashes brute-force 8 characters complex  1 CPU = 25 years  10 GPUs = 15 days rainbow-table 8 characters complex  = minutes  = 120 GB  Every character makes it 80x more difficult  12 characters complex password is unbreakable at least for non-NSA mortals

Cracking from network trace and password cache  No use for rainbow-table MD4 salted  Only brute-force possible

What to remember  Never type a password on an unknown computer  Accessing remote machines with RDP sends there your password  Disable all HTTP Basic and LDAP Simple bind authentications  Use smart cards instead

Where to read more ?CategoryId=17&Name=(Anti)hacking

NASHLEDANOU GOPAS: | | na kurzech v počítačové škole GOPAS, a.s. GOC171 - Active Directory Troubleshooting GOC172 - Kerberos Troubleshooting GOC173 - Enterprise PKI Deployment GOC175 - Administering Security