PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For...

19
PRACTICAL STEPS IN PRACTICAL STEPS IN SECURING WINDOWS NT SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation Guidelines As recommended by corporate As recommended by corporate officials, programmers and officials, programmers and hackers. hackers. By William White By William White

Transcript of PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For...

Page 1: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

PRACTICAL STEPS IN PRACTICAL STEPS IN SECURING WINDOWS NTSECURING WINDOWS NT

Copyright, 1996 © Dale Carnegie & Associates, Inc.

TIP For additional advice seeDale Carnegie Training® Presentation Guidelines

As recommended by corporate As recommended by corporate officials, programmers and officials, programmers and hackers.hackers.

By William WhiteBy William White

Page 2: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

IntroductionIntroduction

• Windows NT is easy to secure, Windows NT is easy to secure, compared to some other systems.compared to some other systems.

• As long as you take some necessary As long as you take some necessary steps, your system will be steps, your system will be reasonably secure.reasonably secure.

Page 3: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Securing Windows NT Securing Windows NT consists of two main consists of two main areas:areas:

• Putting filters between your network Putting filters between your network and the Internet.and the Internet.

• Configuring workstations and Configuring workstations and servers against unauthorized servers against unauthorized access.access.

Page 4: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Filters for your NetworkFilters for your Network

• Firewalls.Firewalls.

• Packet Filtering.Packet Filtering.

Page 5: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

FirewallsFirewalls

• Set your firewall to disable everything, Set your firewall to disable everything, then enable only the access you need.then enable only the access you need.

• Firewalls are effective, but they have two Firewalls are effective, but they have two major problems:major problems:

• 1) High cost.1) High cost.

• 2) It is hard for users on your network to 2) It is hard for users on your network to access the Internet.access the Internet.

Page 6: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Packet FilteringPacket Filtering

• Because much traffic goes through two Because much traffic goes through two ports, you can:ports, you can:

• 1) Enable packet filtering.1) Enable packet filtering.

• 2) Disable port 138, which handles UDP 2) Disable port 138, which handles UDP packets.packets.

• 3) Disable port 139, which handles TCP 3) Disable port 139, which handles TCP packets.packets.

Page 7: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Other Ports to Block with Other Ports to Block with Packet FilteringPacket Filtering

• Service NameService Name PortPort TypeType Port NamePort Name DirectionDirection

FTPFTP 20 tcp ftp-data incoming 20 tcp ftp-data incoming

FTPFTP 21 tcp ftp incoming 21 tcp ftp incoming

Telnet 23 tcp telnet incomingTelnet 23 tcp telnet incoming

Mail 25 tcp smtp incomingMail 25 tcp smtp incoming

NFS 111 tcp portmapper bothNFS 111 tcp portmapper both

NFS 111 udp portmapper bothNFS 111 udp portmapper both

Administration 161 udp snmp bothAdministration 161 udp snmp both

Administration 162 udp snmp bothAdministration 162 udp snmp both

Page 8: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Disable Netbeui over Disable Netbeui over TCP/IP.TCP/IP.

• In control panel->network-In control panel->network->bindings disable these: >bindings disable these:

• 1) NetBIOS Interface -> WINS Client(TCP/IP) -> 1) NetBIOS Interface -> WINS Client(TCP/IP) -> ethernet.ethernet.

• 2) Server -> WINS Client(TCP/IP) -> ethernet.2) Server -> WINS Client(TCP/IP) -> ethernet.

• 3) Workstation -> WINS Client(TCP/IP) -> ethernet.3) Workstation -> WINS Client(TCP/IP) -> ethernet.

Page 9: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuring Workstations Configuring Workstations and Servers against and Servers against Unauthorized Access:Unauthorized Access:

• 1) Disable the Guest account.1) Disable the Guest account.

• 2) Rename Administrator account to 2) Rename Administrator account to something non-obvious.something non-obvious.

• 3) Enable password lock-out user 3) Enable password lock-out user policy.policy.

Page 10: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:

• 4) Set up accounts with passwords 4) Set up accounts with passwords for all local workstations.for all local workstations.

• 5) Use long, difficult to guess 5) Use long, difficult to guess passwords.passwords.

• 6) Keep you administrative 6) Keep you administrative passwords known to a very minimal passwords known to a very minimal group of people.group of people.

Page 11: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:

• 7) Change your passwords regularly.7) Change your passwords regularly.

• 8) Create a backup administrative 8) Create a backup administrative account, with some complicated account, with some complicated password written somewhere outside password written somewhere outside of the computer system.of the computer system.

• 9) Never keep passwords on the disk.9) Never keep passwords on the disk.

Page 12: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:• 10) Don't install FTP Server except for a very 10) Don't install FTP Server except for a very

restricted area.restricted area.

Check if FTP User has permissions to other Check if FTP User has permissions to other areas of the server. areas of the server.

• 11) Don't use Telnet daemon at all.11) Don't use Telnet daemon at all.

• 12) Don't use your administrative passwords 12) Don't use your administrative passwords in any other place, neither in the computer, in any other place, neither in the computer, nor in real life. nor in real life.

Page 13: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:

• 13) Remove Share Permissions to the 13) Remove Share Permissions to the Everyone group.Everyone group.

• 14) Remove Network Access for the 14) Remove Network Access for the Everyone group.Everyone group.

• 15) If you use PERL for CGI programs, 15) If you use PERL for CGI programs, DO NOT put perl.exe into the web DO NOT put perl.exe into the web server's cgi bin directory.server's cgi bin directory.

Page 14: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:

• 16) Restrict FTP.16) Restrict FTP.

• 17) Implement APOP, if you use 17) Implement APOP, if you use POP3.POP3.

• 18) Adjust RAS parameters.18) Adjust RAS parameters.

Page 15: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:

• 19) Keep track of logons and 19) Keep track of logons and security failures.security failures.

• 20) Check the security log regularly.20) Check the security log regularly.

• 21) Run the C2 Configuration 21) Run the C2 Configuration Manager.Manager.

Page 16: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Configuration of Configuration of Workstations and Servers Workstations and Servers -- continued:-- continued:

• 22) Remove the Bypass Traverse 22) Remove the Bypass Traverse Checking right from all user Checking right from all user accounts.accounts.

• 23) Install all NT Service Packs.23) Install all NT Service Packs.

Page 17: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Examples of Past Attacks Examples of Past Attacks on Windows NT:on Windows NT:

• L0phtcrack 1.5 and the "PW Crack" L0phtcrack 1.5 and the "PW Crack" attack -- 1997.attack -- 1997.

• The "GetAdmin” program -- 1997.The "GetAdmin” program -- 1997.

• The "Red Button" attack -- 1997.The "Red Button" attack -- 1997.

Page 18: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

Examples of Recent Examples of Recent Attacks on Windows NT:Attacks on Windows NT:

• IE5 Allows File Creation and IE5 Allows File Creation and Modification -- 8/24/1999.Modification -- 8/24/1999.

• The “Java VM Sandbox” attack -- The “Java VM Sandbox” attack -- 8/26/1999.8/26/1999.

Page 19: PRACTICAL STEPS IN SECURING WINDOWS NT Copyright, 1996 © Dale Carnegie & Associates, Inc. TIP For additional advice see Dale Carnegie Training® Presentation.

CloseClose

• Microsoft releases many fixes for Microsoft releases many fixes for known problems in the form of known problems in the form of Hotfixes, Service Packs and new Hotfixes, Service Packs and new Releases. Releases.

• There is a tradeoff between Security There is a tradeoff between Security and Usefulness.and Usefulness.

• Vigilance is the price of Liberty.Vigilance is the price of Liberty.