Computer Security - Windows Security - Lec III
Computer Security - Windows Security - Lec III
◼ This particular issue has been resolved with Microsoft patch MS08-068.
◼ The patch prevents an SMB client from answering challenges that its own
SMB server service has recently issued.
Prepared by: Kushan Sharma 13
Reflective & Relay Attacks
◼ Relay Attack:
◼ The Relay Attack still co-opts the client to answer a challenge, but this time
the rogue server passes the answer to a 3rd machine in order to gain
access.
◼ The problem is that the answer is still sensitive, and when the server is
compromised, the domain credentials are at risk by exposing the
answer.
◼ Design approaches
involve reflecting:
◼ The actual
organizational structure
◼ Based on geographic
locations
◼ Or using a combination
of the two approaches
◼ Two way trusts – Users from both domain can be given access.
◼ Forest trusts – One way or two way transitive trusts between forests that
allow security principles in one forest to access resources in any domain in
another forest.
◼ They are transitive in the sense that all domain in one forest trust all domain in
another forest, but the trust is not transitive from one forest to another.
◼ Limit the access provided by a trust between two Windows Server 2003
or higher domains in different forests.
◼ This is done by Selective Authentication.
◼ Administrators in the trusting domain must provide users from the other
domain with “permission to authenticate” for each server in the domain.
◼ Administrators can actually grant the other domain users read permission
on a file, but if the users don’t have permission to authenticate to that file
server, they can’t read the file.
◼ Individually crafted Group Policy Objects (GPOs) can be defined and, when
linked to containers in the Active Directory, automatically and periodically apply
these settings.
◼ Windows Server 2003 introduced the Group Policy Management Console (GPMC)
◼ Windows Server 2008 introduced Advanced Group Policy Management (AGPM)
◼ RSoP is a tool:
◼ To predict the effects of applying a group policy.
◼ To actually determine what policies and which parts of them are effective
on a specific machine for a specific user.
◼ Programmers as Administrators:
◼ When programmers are granted with admin privilages, they produce programs that
can't be run by non-administrators.
◼ Programmers can and should do most programming as ordinary users.