260 likes | 384 Views
Hardening Internal Systems and Services. Harden Operating Systems Harden Directory Services Harden DHCP Servers Harden File and Print Servers. System Vulnerabilities. Unique vulnerabilities for: Different operating systems Different vendors Client and server systems
E N D
Hardening Internal Systems and Services • Harden Operating Systems • Harden Directory Services • Harden DHCP Servers • Harden File and Print Servers
System Vulnerabilities • Unique vulnerabilities for: • Different operating systems • Different vendors • Client and server systems • Vendors try to correct; attackers try to exploit • Security professionals must stay current
System Vulnerability Categories • Buffer overflows • Service exploits • Default protocols • Known accounts and passwords • Built-in applications • Physical access • Remote administration • File access methods
System Updates • Patches • Supplemental code • Hotfixes • Patches to address specific flaws • Rollups • Cumulative group of patches & hotfixes • Service Packs • Comprehensive updates with new features
Windows Security Policies Policies set centrally Configuration settings Security Settings node in policy object
Windows Auditing • Configure audit policy • Set auditing on objects • Monitor security log 1 2 3
Services, NLMs, and Daemons Service NLM Daemon
Service, NLM, and Daemon Vulnerabilities • Points of entry for attackers • Target of exploits • Disable unneeded processes • Test before deploying
Security Templates Apply template to a system Predefined settings Templates based on role
Hardening Operating Systems • Balance protection with user access needs • Follow hardening guidelines • Requirements will vary
A Directory Service Authentication Centralized administration
Microsoft Active Directory Domain controller Active Directory Domain member
LDAP LDAP client Directory query LDAP server LDAP client Stores directory data Directory query
Directory Service Vulnerabilities • Active Directory vulnerabilities • Compatibility access • Default permissions • Null sessions • NTLM protocol • eDirectory and NDS vulnerabilities • Read access to tree • CGI security • NDS for NT
Hardening Directory Services • Balance database security with accessibility • Follow hardening guidelines • Requirements will vary
DHCP 192.168.100.151 192.168.100.150 192.168.100.152
DHCP Vulnerabilities • Spoofing • Buffer overflows • Scope modification • Rogue servers • Remote clients
DHCP Hardening • Prevent unauthorized access while providing services • Follow hardening guidelines • Requirements will vary
File and Print Server Vulnerabilities • Administrative shares • Insecure file systems • Lack of redundancy • Man-in-the-middle • Default file security • Physical disk security • Physical printer security
The SMB Process 1 SMB Connection request 2 SMB Data request or print commands 3 SMB Data Print results
SMB Signing Session fails if signing not supported Client signs packets if signing supported
Hardening File and Print Servers • Prevent unauthorized access and protect data; keep services available • Follow hardening guidelines • Requirements will vary
Reflective Questions 1. Does your organization stay current with all the latest operating system patches? Why or why not? 2. Which operating system do you think is most secure: Windows Server 2003, NetWare, or Sun Solaris? Why?