DSS 2015 Riga

Ethical Hacker in Action @DSS2015 that took place in Riga on 22-Oct-2015:

 

 

I know that got failed a lot of times during this presentation. But I know, you gonna seal your webcam, anyway .)

Продолжить чтение этой записи

How to find out how many PCs in your domain are SRP-compliant?

During Application Whitelisting (AWL) implementation throughout an Enterprise, it is essential to easily find an answer for questions like «how far we have come?» Running a fairly complex Active Directory (AD) structure, you can never guess for sure. Instead, you may choose to implement some objective monitoring tool, let’s call it «AWL Compliance Report«. You don’t have SCCM? Not a problem, we will make it happen using built-in Group Policy (GP) mechanism.

For example, it’s quite easy to figure out the presence (or absence) of Software Restriction Policies (SRP) by querying particular values in HKLM\Software\Policy\Microsoft\Windows\Safer\CodeIdentifiers Registry key:

Продолжить чтение этой записи

Centralized SRP Event Auditing

Application Whitelisting technologies such as Software Restriction Policies or AppLocker provide a great level of protection against malware and unwanted software. When blocking launch of an unwanted program, the policy generates a record in the Application Log on a local computer. This allows an administrator to maintain security for a given system and perform policy updates, if needed. However, examining event logs on multiple computers requires too much administrative effort, thus making auditing reactive, not proactive. You can greatly improve control over Application Whitelisting policies by configuring an automatic notification mailing when a particular event is written to the log.

Продолжить чтение этой записи

Something about restoring your server

1. What the restoring are you talking about?

        A computer system is considered to be fault-tolerant not because you make backup copies. Fault-tolerant is the system which can be restored after the crash. No any backup procedure makes sence until you are able to restore data from a backup. The truth is that most of systems administrators have never tried to restore their servers from a backup, and this is just a matter of fact, mostly not depending neither on a company size nor on IT staff members count. This task usually is moved to the later/better time, re-assigned to other team members (so-called ”football game”) or is performed partially (”let’s try to restore the database only and consider everything to be o.k. if it is restored”).

        But the thing is that failures do not warn you in advance.They are not gonna call you stating ”get ready, this will happen in a week” neither send you an e-mail message. So what problems do unexperienced in restoring servers administrators face when critical failure occurs? (Frankly, not only servers, but mission-critical workstations as well.)

Продолжить чтение этой записи

Configuring Windows to run applications with Standard User privileges

1. Why should we separate privileges and configure permissions?

        The separation of privileges is a computer security and antivirus protection fundamental. Usually, all the users log on to the computer with individual accounts that belong to either of two categories: administrative, which are designed to configure and maintain the system; and standard, designed for everyday work. Administrators can do anything they want — install and remove software, update device drivers, infect computer with a virus etc. Standard Users are able to surf Internet, work with documents and e-mail, watch movies. But it is impossible for them to break anything in a system.

Продолжить чтение этой записи

Using Windows Auditing to track user activity

        Time to time something happens that requires us to answer ”who did it?” question. Those occasions are not as frequent, but important ones. A systems administrator is to be ready and prepared to address such issues.

        In most companies there are departments like Project Managers, Accountants, Developers and other employee categories that collaborate and work together with groups of documents being stored in some shared folders on a fileserver or possibly workstations. Occasionally, someone deletes a particular important document or folder with a bunch of documents, resulting in a mission-critical data loss. Considering the described incident, few questions immediatelly arise:

  • At what date and time the incident took place?
  • Which backup should be used to restore the data?
  • Was that an accident or an intentional user action?
  • Or maybe that was some system failure that could happen again?

Продолжить чтение этой записи

Why Microsoft made managing NTFS Permissions even more complex?

        Working with Windows NT 5.0/5.1/5.2 (Windows 2000/XP/2003) systems for a quite long time, I am used to configure NTFS Permissions the way it was. However, the successor NT versions (2008/Vista/7) managed to unpleasantly surprise me. Let’s assume you want to re-configure an access to some particular NTFS folder. For example, the folder containing users’ home directories. This is the way it looks (with NTFS permissions attached) on one of my Windows Server 2003 R2 computers:

Продолжить чтение этой записи