SlideShare a Scribd company logo
IDSC 4490 – Advanced Networking Lecture 5 – Windows NT and 2000 from Security Perspective Alok Gupta Dept. of IDSC
A word on Windows 9x Windows 3x and Windows 9x were more single user oriented and hence the security was of minimal concern. Windows 3x and 9x passwords were stored in a ???.PWL file and could easily be cracked with many password cracking utilities including  Cain ,  L0phtCrack .
Windows 2000 Architecture
Windows 2000 User Mode Provides subsystems for user interaction We’ll focus on security subsystem The Security subsystem coordinates with Win32 subsystem and Active Directory that acts as a central nervous system Windows 2000 has a Security Support Provider Interface (SSPI) that supports a variety of different authentication mechanisms
Security Support Provider Interface (SSPI)
Security Protocols NTLM – Windows NT LAN Manager security protocol For backward compatibility with older Microsoft products Kerberos – A third party encryption scheme More on it when we do encryption SSL – Secure Sockets Layer  Application level security Multiple (third party) authentication using certificates
Kernel Mode Kernel mode is reserved for fundamental operating system functionality such as access to memory and hardware Security Reference Monitor is most important from our perspective Makes sure appropriate users and program are the only ones to be able to access particular files and directories by checking permissions It also captures events by writing to event logs
Fundamental NT/2000 Concepts Domains A group of one or more Windows machine(s) that share an authentication database Domain users can be provided access to domain resources on many machines Domain controllers authenticate users using Security Accounts Manager (SAM) The password information is scrambled using one-way function (hash)
NT/2000 Passwords NT stored passwords directly in SAM database (until service pack 3) Relatively easier to crack Windows 2000 uses another layer of encryption using SYSKEY Uses 128 bit key to encrypt the hashes More difficult to crack
Windows 2000 Network Structure Beyond domain Windows 2000 uses concepts called: Trees – Naming convention, e.g., xyz.com as a tree can have many domains such as sales.xyz.com, support.xyz.com Forests – collection of trusted and untrusted trees that are linked together such as abc.com and xyz.com
Domain, Trees and Forests Domain Tree Forest
Sharing Sharing is a major advantage of Windows NT/2000 Shares can be established using Network Neighborhood, My Network Places, etc. in Windows mode or by using following command C:\net use *  \\[IP  address or hostname]\[share name] [password | *] [/USER:[domainname\]username] Note: ipc$ is the root default share for administrative account
NT/2000 Groups
Defining Users (1)
Defining Users (2)
Defining Security Policies
Default Accounts Administrator Also is a security vulnerability since the account name is known The account name is usually changed Guest Disabled by default
NT/2000 Vulnerabilities Finding out what’s on a network C:\net view /domain:[domain_name] Find out more by C:\nbtstat –A [IP Number] Use Third-party tools such as nbtscan  (usage    C:\nbtscan [IP range using / or -]
NT/2000 Vulnerabilities Can use  net use  \\[computername]\ipc$  "" /u:""   to create a null session If null session can be created a host of information can be downloaded Automated tools such as  Winfo  exist User Accounts Shares Workstation and trusted accounts
Enumerating  a Host Use  DumpSec WalkSam UserInfo UserDump GetAcct Many of these tools can automatically figure out administrative account using RID of 500
A Comprehensive Security Tool Languard  Network Scanner Scans large networks by sending UDP query status to every IP.  Lists NETBIOS name table for each responding computer.  Provides NETBIOS hostname, currently logged username & MAC address.  Enumerates all shares on the remote computer (including printers, administrative shares C$,D$,ADMIN$).  Identifies crackable passwords (share level security) on Windows 9x. Tests password strength on Windows 9x/NT/2k systems using a dictionary of commonly used passwords.  Identifies well known services (such as www/ftp/telnet/smtp...).

More Related Content

PDF
Ch 6: Enumeration
PPTX
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
PPT
PPT
Operating system vulnerability and control
PPT
Operating system security (a brief)
PDF
SELinux basics
PPTX
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
PPTX
File Security System_2
Ch 6: Enumeration
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Operating system vulnerability and control
Operating system security (a brief)
SELinux basics
IMPROVED DATA PROTECTION MECHANISM FOR CLOUD STORAGE WITH THE USAGE OF TWO CO...
File Security System_2

What's hot (18)

PPT
Ch08 Authentication
PPT
Ch03 Protecting Systems
PDF
SELinux introduction
PPT
Introduction To SELinux
PDF
CNIT 123: Ch 6: Enumeration
PPTX
System protection in Operating System
PPT
Chapter 14 - Protection
PPTX
Presentation
ODP
Introduction to Selinux
PPTX
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
PPTX
PPTX
Trusted systems1
PDF
Selinux
PPTX
Operating System Security
PPTX
Protection in general purpose operating system
PDF
Understanding SELinux For the Win
Ch08 Authentication
Ch03 Protecting Systems
SELinux introduction
Introduction To SELinux
CNIT 123: Ch 6: Enumeration
System protection in Operating System
Chapter 14 - Protection
Presentation
Introduction to Selinux
Ethical hacking Chapter 9 - Linux Vulnerabilities - Eric Vanderburg
Trusted systems1
Selinux
Operating System Security
Protection in general purpose operating system
Understanding SELinux For the Win
Ad

Viewers also liked (20)

PDF
Linux Hosting Training Course Level 1-2
PPT
Get your website noticed by Jason King of HAVS
PPTX
setting Dns linux debian
PPT
SureMail: Notification Overlay for Email Reliability
PPS
IT Power Management Strategy
PPT
PPT
Slide 1 - Parallels Plesk Control Panel 8.6.0
PPT
PPT
Managing Diverse IT Infrastructure
PPT
PPT
Parallels Hosting Products
PDF
Slide 1
PPT
SureMail: Notification Overlay for Email Reliability
PPT
Microsoft PowerPoint presentation 2.175 Mb
PDF
Installing web sphere application server v7 on red hat enterprise linux v6.3
PPT
OLUG_xen.ppt
Linux Hosting Training Course Level 1-2
Get your website noticed by Jason King of HAVS
setting Dns linux debian
SureMail: Notification Overlay for Email Reliability
IT Power Management Strategy
Slide 1 - Parallels Plesk Control Panel 8.6.0
Managing Diverse IT Infrastructure
Parallels Hosting Products
Slide 1
SureMail: Notification Overlay for Email Reliability
Microsoft PowerPoint presentation 2.175 Mb
Installing web sphere application server v7 on red hat enterprise linux v6.3
OLUG_xen.ppt
Ad

Similar to Class Presentation (20)

PPT
Module 4 Enumeration
PPS
Microsoft (Data Protection Solutions)
PPT
A Critical Analysis of Microsoft Data Protection Solutions
PDF
O.s. lab all_experimets
PPT
Module 8 System Hacking
PPT
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
PDF
Essay On Active Directory
PPT
Windows nt
PDF
29041329 interview-questions-for-server-2003
PPT
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
ODP
Ph d proposal_20070809
PPT
Ch11 system administration
PPTX
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
PDF
Ceh v5 module 04 enumeration
PPT
Cloud Security
PPTX
Firewalls
PPT
Session 9 Tp 9
PPT
Dns protocol design attacks and security
PPT
Ch08 Microsoft Operating System Vulnerabilities
PPT
Microsoft Operating System Vulnerabilities
Module 4 Enumeration
Microsoft (Data Protection Solutions)
A Critical Analysis of Microsoft Data Protection Solutions
O.s. lab all_experimets
Module 8 System Hacking
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Essay On Active Directory
Windows nt
29041329 interview-questions-for-server-2003
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Ph d proposal_20070809
Ch11 system administration
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Ceh v5 module 04 enumeration
Cloud Security
Firewalls
Session 9 Tp 9
Dns protocol design attacks and security
Ch08 Microsoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities

More from webhostingguy (20)

PPT
File Upload
PDF
Running and Developing Tests with the Apache::Test Framework
PDF
MySQL and memcached Guide
PPT
Novell® iChain® 2.3
PDF
Load-balancing web servers Load-balancing web servers
PDF
SQL Server 2008 Consolidation
PDF
What is mod_perl?
PDF
What is mod_perl?
PDF
Master Service Agreement
PPT
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PDF
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
PPT
Web design for business.ppt
PPS
Excel and SQL Quick Tricks for Merchandisers
PDF
Reseller's Guide
PDF
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
PDF
Getting Started Guide
PDF
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
PDF
Best Practises: Java OGSI Hosting Environment Design
PDF
Host Based Security Best Practices
File Upload
Running and Developing Tests with the Apache::Test Framework
MySQL and memcached Guide
Novell® iChain® 2.3
Load-balancing web servers Load-balancing web servers
SQL Server 2008 Consolidation
What is mod_perl?
What is mod_perl?
Master Service Agreement
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Web design for business.ppt
Excel and SQL Quick Tricks for Merchandisers
Reseller's Guide
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Getting Started Guide
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
Best Practises: Java OGSI Hosting Environment Design
Host Based Security Best Practices

Class Presentation

  • 1. IDSC 4490 – Advanced Networking Lecture 5 – Windows NT and 2000 from Security Perspective Alok Gupta Dept. of IDSC
  • 2. A word on Windows 9x Windows 3x and Windows 9x were more single user oriented and hence the security was of minimal concern. Windows 3x and 9x passwords were stored in a ???.PWL file and could easily be cracked with many password cracking utilities including Cain , L0phtCrack .
  • 4. Windows 2000 User Mode Provides subsystems for user interaction We’ll focus on security subsystem The Security subsystem coordinates with Win32 subsystem and Active Directory that acts as a central nervous system Windows 2000 has a Security Support Provider Interface (SSPI) that supports a variety of different authentication mechanisms
  • 5. Security Support Provider Interface (SSPI)
  • 6. Security Protocols NTLM – Windows NT LAN Manager security protocol For backward compatibility with older Microsoft products Kerberos – A third party encryption scheme More on it when we do encryption SSL – Secure Sockets Layer Application level security Multiple (third party) authentication using certificates
  • 7. Kernel Mode Kernel mode is reserved for fundamental operating system functionality such as access to memory and hardware Security Reference Monitor is most important from our perspective Makes sure appropriate users and program are the only ones to be able to access particular files and directories by checking permissions It also captures events by writing to event logs
  • 8. Fundamental NT/2000 Concepts Domains A group of one or more Windows machine(s) that share an authentication database Domain users can be provided access to domain resources on many machines Domain controllers authenticate users using Security Accounts Manager (SAM) The password information is scrambled using one-way function (hash)
  • 9. NT/2000 Passwords NT stored passwords directly in SAM database (until service pack 3) Relatively easier to crack Windows 2000 uses another layer of encryption using SYSKEY Uses 128 bit key to encrypt the hashes More difficult to crack
  • 10. Windows 2000 Network Structure Beyond domain Windows 2000 uses concepts called: Trees – Naming convention, e.g., xyz.com as a tree can have many domains such as sales.xyz.com, support.xyz.com Forests – collection of trusted and untrusted trees that are linked together such as abc.com and xyz.com
  • 11. Domain, Trees and Forests Domain Tree Forest
  • 12. Sharing Sharing is a major advantage of Windows NT/2000 Shares can be established using Network Neighborhood, My Network Places, etc. in Windows mode or by using following command C:\net use * \\[IP address or hostname]\[share name] [password | *] [/USER:[domainname\]username] Note: ipc$ is the root default share for administrative account
  • 17. Default Accounts Administrator Also is a security vulnerability since the account name is known The account name is usually changed Guest Disabled by default
  • 18. NT/2000 Vulnerabilities Finding out what’s on a network C:\net view /domain:[domain_name] Find out more by C:\nbtstat –A [IP Number] Use Third-party tools such as nbtscan (usage  C:\nbtscan [IP range using / or -]
  • 19. NT/2000 Vulnerabilities Can use net use \\[computername]\ipc$ "" /u:"" to create a null session If null session can be created a host of information can be downloaded Automated tools such as Winfo exist User Accounts Shares Workstation and trusted accounts
  • 20. Enumerating a Host Use DumpSec WalkSam UserInfo UserDump GetAcct Many of these tools can automatically figure out administrative account using RID of 500
  • 21. A Comprehensive Security Tool Languard Network Scanner Scans large networks by sending UDP query status to every IP. Lists NETBIOS name table for each responding computer. Provides NETBIOS hostname, currently logged username & MAC address. Enumerates all shares on the remote computer (including printers, administrative shares C$,D$,ADMIN$). Identifies crackable passwords (share level security) on Windows 9x. Tests password strength on Windows 9x/NT/2k systems using a dictionary of commonly used passwords. Identifies well known services (such as www/ftp/telnet/smtp...).