Security+ Lab Answers
Security+ Lab Answers
SECURITY+ CERTIFICATION
LAB 1:
Defensive Measure
Description
Auditing Digital signature Encryption Firewall ID (intrusion detection) [also IDS, intrusion detection system] Password security
Create accounts only when needed, grant minimal permissions to get the job done, and remove access when it is no longer required. Use applications that automatically remove malicious software such as viruses, worms, and Trojan horses. Keep antivirus software updated to respond to new threats. Monitor the activities of services, users, and administrators to verify compliance with security policies. Archive and review log files. Use a digital signature. For example, use a digital signature to ensure the integrity of data or verify the identity of a sender. Obscure information so it cannot be understood by an unauthorized person. Install and properly configure a firewall to control and monitor inbound and outbound traffic. Use IDS to alert network administrators of activity resembling known attacks. Choose passwords that are difficult to guess or break. Change passwords frequently, but not too frequently or users will use unsafe ways to remember passwords. Require unique passwords that follow appropriate standards for complexity and length. Audit for compliance with password security. Know what is installed on your system by default. Use the security features built into your applications. Make sure they are configured for the maximum allowable security. Follow the best practices recommended by the manufacturer. Restrict physical access to any of the following components: hardware; software; firmware; data media, such as disks, backup tapes, and Zip drives. Control entry to buildings and rooms by locks or access cards. Dont use untrusted systems. Create a tested standard for configuring all computers of a specific type. Test and apply different baselines for different resources, such as a secure e-mail server, Web server, file server, or desktop computer. Verify that the system maintains a secure configuration. Create documents that specify all security policies. Use technology to enforce security policies whenever possible. Apply software updates to fix known problems with operating systems or applications. Problems with software can allow attackers to bypass security controls. Train users to follow safe computing practices.
Proper configuration
Physical security
Secure baseline
User education
Insufficient background He might plant checks; inadequate physical someone inside the company as a janitor security so that he can get physical access. Key systems that are He might scan the perimeter servers and inadequately patched; misconfigured key systems look for software exploits that he can run. He might try password Weak passwords attacks against the Internet Web server.
She might deface the Web site with graphic pictures of animal experimentation. She might try to sabotage computer systems to stop research. She might try to steal confidential data that relates to animal research by using malicious software to access a server.
Insufficient physical security; Physical security; security inadequate policies to prevent policies; user education social engineering Inadequate virus protection; poor user education; inadequate firewall security; no intrusion detection Antivirus software; thorough user education; adequate firewall security; intrusion detection; encryption
4. When all groups are finished, present your attack scenarios to the other students in the class as though they were a senior management committee.
QUESTION What is the difference between a threat and a vulnerability? ANSWER A threat is any activity that possesses a danger to data and other resources. A vulnerability is a weakness that can be exploited by a threat.
2. Calculate the annualized loss expectancy (ALE), using the following formula: SLE x annualized rate of occurrence (ARO) = ALE. The ALE is simply a way of estimating the loss that could occur on a yearly basis if no defensive measures were put in place.
ANSWER ALE = $11,375.00 x 0.75 = $8531.25
3. Calculate the cost/benefit of antivirus software, using the following formula: ALE cost of antivirus software implementation = cost/benefit. In this step, you are determining whether the cost of implementing a countermeasure is less than or greater than the cost of the asset. If the cost of the countermeasure is less than the loss that would occur in the event of a realized threat, the argument for implementing it is clear. To determine the cost of implementing the countermeasure, you need to take into account the cost of software licenses, labor costs, and other relevant factors. In this case, the only data you have relates to the software license and labor costs.
ANSWER Cost/benefit = $8531.25 - (4000 + (0.5 x $20.00 x 200)) = $2531.21
4. Present your findings to the class, using the results from the previous calculations to justify the purchase of antivirus software.
QUESTION This exercise demonstrates a quantitative risk analysis. Is this the only kind of analysis you can or should perform to assess risk? If not, what other kind of risk analysis can you perform? ANSWER You might also want to perform a qualitative risk analysis. In a qualitative risk analysis, quantifiable numbers, such as those that are assigned to asset values and potential losses, are not used. Instead, a qualitative analysis examines various risk scenarios and attempts to rate the seriousness of the risk and effectiveness of various countermeasures. Often, participants are asked to rate the seriousness of risk and the effectiveness of countermeasures, using a ranking scale. However, many other methods can be used to perform a qualitative analysis. These methods include surveys, brainstorming, the Delphi technique, and group and one-on-one meetings. QUESTION The quantitative analysis in this exercise makes only a limited number of assumptions about the kind of loss that would occur if the branch office were infected by a virus. What other kinds of loss should you include in the quantitative risk analysis of a potential virus infection? ANSWER Answers will vary, but they can include the cost of replacing lost or corrupted data;, and the cost of additional follow-up efforts to eliminate potential back doors, worms, Trojan horses, logic bombs, and other potential problems created by the virus payload.
Buffer overflow
Web defacing
The amount of data is larger than the holding area, or buffer, that the program sets aside for incoming data. When the data is placed into the computers memory, it might overwrite other data. Unauthorized alteration of Web site content done to undermine the organizations reputation. An attack that involves direct physical contact with a computer or network components. A computer program that appears to have a benign or useful function, but is actually used for malicious purposes. An attack that prevents a system from performing its intended service.
Security baseline; proper configuration Physical security; auditing User education; intrusion detection; antivirus software Intrusion detection; firewall; proper configuration; secure baseline Firewall; intrusion detection; digital signature; encryption User education; security policies; auditing; physical security; account security User education; security policies; antivirus software Encryption; digital signature; firewall; physical security
Spoofing
The practice of making a transmission from an illegitimate source appears to have originated from a legitimate source. An attack that relies on deceiving people, rather than on exploiting the vulnerabilities of computer systems.
Social engineering
Virus
Packet sniffing
A computer program that spreads from computer to computer through some installation vector, such as an executable attachment in an e-mail message. A passive attack that monitors network communications, usually as a preparatory step to an active attack.
QUESTION Worms are often referred to as a kind of virus. However, worms differ from true viruses in one important aspect. In what way do worms differ from true computer viruses? ANSWER A computer virus requires human agency to spread. Without human agency, a virus cannot propagate itself. However, worms can replicate themselves to other computer systems without human agency.
Wireless networks are not physically secure because the wireless signal can be intercepted by any compatible wireless device within range. To provide better security for a wireless network, you need to encrypt the traffic. You also need to limit the wireless signal range so that it does not extend farther than is desirable by ensuring that wireless access points (APs) are placed away from locations such as windows. Furthermore, the WEP key is not rotated often enough and is more vulnerable to being cracked. (This last issue is also related to trust issues.) Employees could deliberately or inadvertently give the WEP key to unauthorized individuals. Generally, it is not a good practice to trust employees with the WEP key. Transmitting the WEP key via e-mail makes it easy for this information to be transmitted elsewhere. Allowing DHCP wireless clients to connect means that anyone with a compatible wireless device that is within range can automatically connect to the network (This is also a privilege level issue, since unauthenticated users could potentially access the LAN through the wireless network). Current corporate security policies might specify that users are not allowed to configure hardware devices.
2. Trust Issues
3. Privilege Issues
4. Documentation Issues
The proposal does not include information on wireless network usage policies. For example, users and administrators need documentation on the procedures that should be followed if a wireless device is lost or stolen.
3. What is generally the most effective way to deal with passive attacks: prevent them, or detect and stop them?
ANSWER Passive attacks are usually very hard to detect, so the best defense is to try to prevent them from occurring in the first place.
10
11
Can be difficult to agree on the accounting methods that are used to assign value to assets; for example, using book value or using current value (original cost depreciation) Can be difficult to accurately quantify the likelihood of certain kinds of threats Pros of qualitative risk analysis Can be used to achieve consensus when there is disagreement about the likelihood of threats and the need for specific countermeasures Is based on the informed opinions of experienced personnel Allows a wider range of stakeholders and interested parties to have input into the risk analysis Can be used to justify the implementation of security countermeasures Cons of qualitative risk analysis Requires that management trust the informed opinions of staff Does not provide quantifiable cost benefits for implementing countermeasures Does not present information in financial terms, so it might be less persuasive than a quantitative risk analysis in justifying the cost of security countermeasures Relies significantly on intuition and guesswork
12
LAB 2:
13
2. Click OK.
QUESTION Does the user name of the last logged-on user appear in the Log On To Windows dialog box? ANSWER No.
7. In the Telnet Properties (Local Computer) dialog box, in the Startup Type list, select Manual, and then click OK.
QUESTION Were you able to change the startup type? Why or why not? ANSWER No. Only members of the local Administrators group have the permissions required to change the startup type for the Telnet service.
14
EXERCISE 2-3: ASSESSING BASELINE SECURITY BY USING MICROSOFT BASELINE SECURITY ANALYZER (MBSA)
11. Review the available scanning options, select Learn More About Scanning Options, select the In The Future Do Not Show This Message check box, click OK in the Internet Explorer dialog box, and then read the description of the scanning options.
QUESTION What does selecting the Use SUS Server option do? ANSWER Selecting the Use SUS Server option allows MBSA to check for security updates against a list of SUSapproved updates.
18. In the Score column of the report, move the mouse pointer over a red X so that the mouseover event pop-up description appears.
QUESTION What does a red X indicate? ANSWER A red X indicates that the check failed (critical).
19. Move the mouse over the various icons in the Score column.
QUESTION List the meanings of the icons you see in the Score column. ANSWER Answers may vary, depending on what students see in the report. A red exclamation mark indicates that MBSA was unable to perform a particular scan. A yellow X indicates that the check failed (non-critical). A blue i indicates more information is available. A green check mark indicates that the check passed. A blue star indicates a recommended best practice.
20. Locate the item that displays Windows Security Updates in the Issue column, and then click Results Details.
QUESTION What information is displayed in the Results Details page? ANSWER The Results Details page lists the Microsoft Security bulletin ID, a description of the vulnerability, and the reason that the test failed for the particular vulnerability.
15
EXERCISE 2-4: MAINTAINING BASELINE SECURITY BY USING MICROSOFT SOFTWARE UPDATE SERVICES (SUS)
Installing and Configuring SUS
26. Click Approve Updates. Because you chose to synchronize the list of approved items from the server from which you downloaded the updates, all of the updates are already approved. Notice that the check box to approve updates is dimmed. The reason for this is that you have configured your SUS server to rely on an upstream SUS server (Instructor01) for the update approval.
QUESTION In this exercise, you are not downloading updates from Microsoft but from another SUS computer on the network. What are some advantages of this configuration? ANSWER Answers will vary, and can include the fact that updates can be centralized and consequently conserve Internet bandwidth. It is also important to note that this configuration limits the number of computers that need to communicate over the Internet. Another advantage is that the approval process for updates can be centralized and handled by a small group of people.
2. Your organizations security policy states that after software updates have been tested and approved, they must be installed on user workstations with a minimum amount of end user interaction. How would you configure a Windows Update policy to meet this requirement?
ANSWER In Configure Automatic Updates property, you would enable option 4 Auto Download And Schedule The Install.
16
3. You have installed SUS on your network. What do you need to do to make updates available to client computers on the network?
ANSWER You must approve updates, using the SUS administrative interface, before they can be made available to clients.
4. You have set up a dedicated workstation to perform MBSA scans of computers on your network. Your organizations security policy states that this computer cannot have a direct connection to the Internet. What do you need to do in order to scan computers for needed security updates?
ANSWER You must obtain a current copy of the Mssecure.xml file and copy it to the dedicated workstation.
5. What happens if you import more than one security template into the Security Configuration And Analysis tool?
ANSWER The database will merge the templates into one composite template. If there is a conflict in the settings among the imported templates, the last template imported will take precedence.
6. What permissions do you need to run an MBSA scan against a local or remote computer?
ANSWER You need to have local administrative privileges.
17
the scan can be triggered by a schedule and the results of the scan can be imported into a database or spreadsheet.
ANSWER In order to complete this lab, you must use the command-line version of MBSA, not the GUI version. The following command is a possible answer:
Mbsacli /hf -d contoso.com -o tab -f MBSAreport.txt -sus "http://instructor02"
You can put this command in a batch file that can be triggered according to a schedule using the AT command.
18
LAB 3:
19
QUESTION Which accounts failed the test? ANSWER The Administrator account, the Guest account, and the two local user accounts, Sally and Bob, have blank or weak passwords.
17. Double-click the remaining password settings and review their configuration.
QUESTION List the remaining password setting configurations and where they originated. ANSWER All password policies originate from the Default Domain Policy. Maximum Password Age = 42 days Minimum Password Age = 1 days Minimum Password Length = 7 characters Password Must Meet Complexity Requirements = Enabled Store Passwords Using Reversible Encryption = Disabled
18. In the console tree, browse to Computer Configuration\Windows Settings\Security Settings\Local Policies, select Audit Policies, and then
20
11. In the Audit Privilege Use Properties page, select the Success check box, and then click OK.
QUESTION Why can you change these settings, but not the password policy settings, using the Local Security Settings MMC console? ANSWER Because no Group Policy settings are defined for these objects that would consequently override settings defined locally, you can modify these settings.
21
16. Click OK to reset the password and close the Set Password For Guest dialog box.
QUESTION Why is P@ssw0rd acceptable as a password but password is not? ANSWER P@ssw0rd meets minimum complexity requirements.
17. Click OK to close the Local Users And Groups dialog box, indicating the password has been successfully set.
QUESTION If the Guest account is disabled, why should you assign a complex password to it? ANSWER If the Guest account is inadvertently enabled, a preassigned, complex password will secure the account.
23. In the details pane of the Security Log, double-click the entries that belong to the Account Management category, and then review them.
QUESTION What Account Management events are recorded? ANSWER Removing Bob and Sally from the Administrators group, deleting the Bob and Sally accounts, and resetting the password for the Guest account.
22
QUESTION Why is it a good idea to configure security auditing for account management events? ANSWER To keep a record of such events and to help you detect the improper use of administrative privileges.
23
15. Expand Event Viewer, and then select the Security log. Security audit events appear in the details pane.
QUESTION Why are you able to view the Security log? ANSWER Even though you are logged on using an account that does not have administrative credentials, you launched the Computer Management console with alternate credentials that do have administrative permissions.
34. On the Docs Properties page, select the Share Permissions tab.
QUESTION What permissions does the Studentx account have to the newly created \Docs folder when access occurs through the shared folder (\\Computerx\Docs)? ANSWER Although the Studentx account has NTFS modify permissions to the \Docs folder, it has only the Read permission through the shared folder by virtue of its membership in the local Users group. This means that the accounts effective permission to the \Docs folder is read-only when access occurs over the network. When the user accesses the folder locally, the shared folder permissions will not apply and the user will have Modify access.
24
16. Review the effective permissions for the Studentx account by scrolling down the list of permissions.
QUESTION What objects is the Studentx account allowed to create and delete? ANSWER The Studentx account can create and delete user objects.
2. What are the default password complexity requirements of a Windows 2003 domain?
ANSWER Passwords cannot contain all or part of the user's account name. Passwords must be at least six characters long. Passwords must contain characters from three of the following four categories: English uppercase characters (A through Z) English lowercase characters (a through z) Base 10 digits (0 through 9) Nonalphabetic characters (for example, !, $, #, %).
25
3. When you use MBSA to scan computers for vulnerabilities, when should you disable scans for weak passwords?
ANSWER When a domain controller contains a large number of accounts, you might want to disable the option to scan for weak passwords because this type of scan can take a considerable amount of time if a large number of accounts have to be evaluated.
4. What important security principle is implicit in the use of the Run As command?
ANSWER The principle of least privilege. Using the Run As command makes it unnecessary for a network administrator to log onto the network using an administrative account for most of the tasks she has to perform.
5. A user belongs to two security groups that have been granted different NTFS permissions to a folder. For example, one security group has the Write permission to a folder and another group has Read and Execute permissions. How are NTFS permissions determined for the user? What happens if one of the groups is explicitly granted the Deny permission to the file or folder?
ANSWER In the absence of Deny permissions, NTFS permissions are combined. In the example above, the users permissions would be Write, Read, and Execute. However, if the Deny permission had been explicitly granted, the Deny permission would take precedence.
6. A user has been granted NTFS modify permissions to a folder and Read and Execute permissions to a file within the folder. What are the users effective permissions to the file?
ANSWER File permissions have precedence over folder permissions, even when the Deny permission is present on the folder.
7. NTFS permissions are an example of what kind of access control? a. Discretionary access control (DAC) b. Mandatory access control (MAC) c. Role-based access control (RBAC)
ANSWER a.
26
8. The help desk receives a call from a user who claims that he has lost his password and wants it reset. The help desk technician asks the user a number of questions to verify the users identity and then resets the password. Subsequently, it is discovered that the help desk technician and company were both victims of fraud perpetrated by an individual who stole an employees personal information and used it to gain access to the network. How does delegating authority to reset user account passwords to an individual who knows most or all of the users help to mitigate the risk from this kind of attack?
ANSWER The help desk and the company were victims of a social engineering attack. When help desk technicians are responsible for resetting passwords for many users, the technicians are vulnerable to this kind of fraud because they do not know the user personally, as would be the case with a manager or some other trusted person who could be delegated authority to reset passwords.
27
with Windows 2003 to use as the basis for implementing and enforcing stronger authentication methods.
TIP In order to complete this Lab Challenge, you might have to refer to the Windows 2003 help files. ANSWER Because all clients and servers will use Windows 2000 or higher operating systems, it is possible to eliminate LAN Manager authentication entirely and to use NTLM or NTLM v2 authentication exclusively. At a minimum, the Network Security: LAN Manager Authentication Level setting should be configured to Send NTLM Response Only. Configuring the policy setting to require NTLMv2 authentication only is also possible. Other possible answers include configuring other Network Security Settings, such as Network Security: Minimum Session Security For NTLM SSP Based (Including Secure RPC) Clients, but these answers will be dependent upon the LAN Manager Authentication Level setting. Either the Secure (Secure*.inf) or the Highly Secure (hisec*.inf) template could be used as the basis for configuring policies that implement strong authentication mechanisms. Also, an easily overlooked setting is that the domain mode should be changed to Windows 2003 from Windows 2003 interim.
28
LAB 4:
29
QUESTION If there are any unencrypted files in the folder, why are they unencrypted? ANSWER The parent folder is unencrypted, which allows the creation of unencrypted files.
10. Type cipher, press ENTER, and review the output of the command.
QUESTION What will happen to new files if they are added to the C:\Encrypted Folder directory? ANSWER New files added to the folder will be encrypted.
12. At the command prompt, type cipher, press ENTER, and review the output.
QUESTION Why is Encryption Test.txt encrypted? ANSWER The parent folder is encrypted, causing all newly created files in the folder to be encrypted as well.
30
23. On the Sharing Was Successful page, click Close, and then close Computer Management.
QUESTION Why did you have to open the Computer Management console with alternate credentials to share the RemoteEFS folder? ANSWER The Studentx account does not have a sufficient level of permissions to create a shared folder and cannot use Windows Explorer to configure the share on the folder.
27. Double-click the RemoteEFSTest file to open Notepad, enter some text, and then save and close the file.
QUESTION How do you know that the file has been encrypted? Why was the file encrypted? ANSWER The file changes color in the Windows Explorer window. Also, you can view the properties of the file to see that it has been encrypted. Also, you can verify whether the file was encrypted by using the Cipher.exe and Efsinfo.exe command line utilities. The file was encrypted because the properties of the folder are configured to encrypt files.
31
13. In the Group Or User Names box, select each of the security groups in turn. Note the permissions that are displayed in the Permissions box.
QUESTION What effective permissions does the Studentx account have for basic EFS certificates by virtue of belonging to both the Domain Users and the Authenticated Users groups? ANSWER Because the Studentx account is a member of both Domain Users and Authenticated Users, the Studentx account has Read and Enroll permissions.
16. In the Group Or User Names box, select each security group in turn. Note the permissions that are displayed in the Permissions box.
NOTE The Class Admins group that is listed in the Group Or User Names box was manually created as part of the classroom setup. The group contains all the Adminx accounts used for this lab. QUESTION What security groups can request EFS recovery agent certificates? ANSWER The ClassAdmins, Domain Admins, and Enterprise Admins can request EFS recovery agent certificates.
32
33
2. You have enabled a file server to support remote encryption, and users are storing encrypted files through shared folders on the server. In what way is the confidentiality of the data still vulnerable?
ANSWER The data is not encrypted in transit from the client workstation to the server. Therefore, the confidentiality of the data is vulnerable to eavesdropping attacks.
3. Why should you configure encryption at the folder level, rather than at the file level?
ANSWER Newly created or added files to the folder will be automatically encrypted.
4. You move an encrypted file to an unencrypted folder that resides on an NTFS volume. Does the file remain encrypted? What would happen if the file were moved to a folder on a file allocation table (FAT) volume?
ANSWER Encryption travels with the file, as long as the target volume is NTFS 5. If you move the file to an NTFS 4 volume (the version of NTFS used by Microsoft Windows NT 4.0), the file will be decrypted. This is also the case when you move or copy a file to a FAT16 or FAT32 volume. However, if you move an unencrypted file from one folder to an encrypted folder on the same NTFS volume, the file will remain unencrypted. The reason for this is that by moving a file to a different location on the same volume, you have only changed a pointer record in the file table, but not any of the bits belonging to the file itself. If you copy an unencrypted file from one folder to an encrypted folder, the file will be encrypted.
5. You are reallocating a removable hard drive to another user and are concerned that the portable hard drive might contain sensitive information. What Cipher.exe command-line option should you use to
34
ensure that this data cannot be recovered from the hard drive?
ANSWER You can use the Cipher.exe /w command to ensure that data is more thoroughly erased from the hard drive and cannot be recovered by using special tools.
6. You connect to an SSL-enabled e-commerce Web site. How can you view the details of the digital certificate used to establish the SSL-encrypted session?
ANSWER You can double-click the lock icon in the lower right corner of the Web browser to view the details of the digital certificate.
7. You are using Network Monitor to examine HTTPS traffic. You notice that the port used by the Web server is always TCP port 443, but that the TCP port used by the Web browser client varies.
QUESTION What are TCP/IP ports, and what are they used for? ANSWER A port is a kind of connection address for TCP or User Datagram Protocol (UDP) traffic. When upper-layer client applications such as Web browsers connect to server applications such as Web servers, they use well-known port addresses to make the initial connection. For example, the well-known port address of HTTP is 80; for HTTPS it is 443; for SMTP it is 25; for POP3 it 110; and so on. When a client application connects to a server application, it initiates the connection at the well-known port address and informs the server of the TCP or UDP port to be used for the reply. This port is opened dynamically by the client application and is some value above 1024.
35
LAB CHALLENGE 4-1: BACKING UP AND RESTORING EFS KEYS USED TO ENCRYPT AND DECRYPT DATA
You are a security administrator for Contoso Pharmaceuticals. A small group of research scientists uses EFS extensively to protect proprietary data. These scientists are about to receive new dual-processor workstations. Because the EFS digital certificates the scientists use to encrypt and decrypt their data are stored with their profiles on the local computer, they will not be able to access their encrypted data if they lose these certificates. One solution to the problem would be to use roaming profiles. However, company policy does not allow the use of roaming profiles. Although you have configured an EFS recovery agent, the scientists would like to back up their own EFS keys that are found in the EFS certificate and restore them to the new workstations. They have asked you to demonstrate how to back up and restore EFS keys to a different workstation. For this lab challenge, demonstrate how to back up and restore EFS keys for a test user account. You should try to make the demonstration as real as possible by simulating the loss of keys used for EFS encryption. How can you do this?
ANSWER To make the demonstration as real as possible, you should create a user account, use it to encrypt some files, back up its EFS keys, and then delete its local profile to simulate the effect of logging on to a new computer and creating a new local profile. After doing this, you can restore the EFS keys to demonstrate you have access to the encrypted files.
36
LAB 5:
USING CERTIFICATES
EXERCISE 5-1: EXAMINING ROOT CERTIFICATES
Using the Certificates Snap-In MMC Console to View and Manage Root Certificates
6. On the Certificate page, note the information and answer the following questions:
QUESTION What is the intended purpose of the certificate? ANSWER The intended purpose of the certificate is to ensure the identity of the remote computer. QUESTION What entity issued the certificate? ANSWER The certificate was issued by Contoso CA.
22. In the console tree, expand Certificates - Current User, expand Trusted Root Certification Authorities, and then select Certificates, as shown below.
37
GL05XX03
QUESTION What kinds of entities are represented by the prepopulated certificates in the Trusted Root Certification Authorities certificate store? ANSWER The certificate store includes the certificates from the Microsoft Windows 2003 Enterprise CAs that are part of the PKI for the Active Directory directory service. Many of the certificates included in the Trusted Root Certification Authorities represent commercial third-party certificate vendors, such as Verisign, that commonly issue certificates for publicly accessible e-commerce sites and other sites that require encrypted sessions.
25. In the console tree, expand Certificates (Local Computer), expand Trusted Root Certification Authorities, and then select Certificates.
QUESTION Is the CONTOSA CA root certificate in the local computer certificate store? ANSWER No. The certificate has been removed.
38
8. On the Name And Security Settings page, type Computerxx Web Certificate (where xx is the two-digit version of your student number) in the Name box; in the Bit Length box, select 2048; and then click Next.
QUESTION What is the maximum bit length you can select? ANSWER 16,384 bits.
EXERCISE 5-3: IMPLEMENTING USER CERTIFICATE AUTHENTICATION FOR ACCESS TO WEB SITES
Creating a Virtual Directory for Certificate-Based Authentication
13. Click OK to close the CertSecure Properties dialog box.
QUESTION What is the effect of the configuration in step 12? ANSWER The user must present a valid digital client certificate to access the virtual directory.
7. On the Export File Format page, ensure that Personal Information Exchange PKCS #12 (.PFX) is selected, ensure that Enable Strong
39
Protection is selected, and then click Next. When you enable strong protection, the file containing the certificate information will be protected with a password.
QUESTION Why is it a good idea to enable strong protection when you export this certificate? ANSWER Because the private key is being exported, you must take special care to ensure that the private key is not compromised.
2. You have configured an intranet Web server with a digital certificate and have used the internal Domain Name System (DNS) nameintranetas the common name for the certificate. The Web server is also accessible from the Internet for customer access. The external DNS name of the Web server is www.contoso.com. Why is the configuration of the digital certificate a problem?
ANSWER Customers will receive a warning message indicating that the name on the certificate does not match the name of the site, resulting in a lack of confidence in the site. Another problem is that the certificate provides information on an internal computer name, which could be used by attackers to gain information about the internal network.
3. Where can you view the common name used for a Web certificate after you connect to an SSL-enabled Web site?
ANSWER By double-clicking the lock icon in the lower right corner of the Web browser, you can view the details of the certificate. The common name is listed in the subject field of the certificate.
40
4. Your organization wants to set up an SSL-enabled Web site that the public can access from the Internet. Your manager suggested that the organization could save money by using Microsoft Certificate Services instead of purchasing a third-party digital certificate from a commercial CA. What is the primary disadvantage of this suggestion?
ANSWER The primary disadvantage is that Internet users will receive a warning message that the certificate cannot be verified up to a trusted CA, resulting in a lack of confidence in the security of the Web site.
5. One of your employees tells you he understands that a digital certificate contains a public key that is used for encryption, but he is somewhat confused about the difference between a public key and a certificate. How do you explain the difference?
ANSWER Public keys are used to encrypt messages, which can be decrypted only by a complementary private key. A certificate contains the public key that Web clients use to encrypt specific messages with Web servers. A digital certificate verifies the identity of the owner of the key through the information contained in the certificate, such as the common name or the name of the CA that issued the certificate. Before communicating with the Web server, the Web browser client verifies the identity of the Web server and verifies that the public key is in fact owned by the Web server; that is where the digital certificate comes in. A good commercial CA will go through an authentication and verification process to ensure that the entity applying for the certificate is providing truthful information.
41
summarize the general requirements and steps to enable autoenrollment of user certificates.
ANSWER A new feature of Windows 2003 is the ability to distribute user certificates through autoenrollment. This means that, depending on the configuration, users will not have to interact with Certificate Services to request or renew certificates. To enable autoenrollment, you must install the CA on either a Windows 2003 Enterprise or Datacenter Server. Autoenrollment for user certificates works only with version 2 certificate templates, which in turn require Active Directory and an enterprise CA. Enabling autoenrollment of user certificates requires that you create a version 2 template of the user certificate, that you configure an enterprise CA to issue autoenrolled user certificates, and that you configure a group policy for domain users who will receive the autoenrolled user certificate.
42
LAB 6:
43
QUESTION What are the sizes of the hardware and IP addresses? ANSWER Hardware address, 6 bytes; IP address, 4 bytes. QUESTION What is indicated by a hardware address of FF FF FF FF FF FF? ANSWER This indicates a hardware broadcast address. QUESTION What is the purpose of an ARP request? ANSWER To determine the hardware address for a target IP address by means of a broadcast on the local subnet.
18. Select the second instance of ICMP traffic, as indicated by the entry in the Description column that displays ECHO: Reply; then record the values for the following in the space below. FRAME: Total frame length: ETHERNET: Ethernet destination address: ETHERNET: Ethernet source address: ETHERNET: Ethernet type: IP: Protocol: IP: Fragmentation summary: IP: Time to live: IP: Source address: IP: Destination address:
QUESTION How many ICMP frames are generated (total) as a result of using the Ping command? Hint: In the top pane, count the number of rows that display ICMP in the Protocol column. ANSWER Eight frames: four frames for Echo: From, and four for Echo: Reply.
44
QUESTION Why do the Ethernet source and destination addresses need to be present? ANSWER On Ethernet (and other) networks, hosts communicate with one another by means of hardware addresses. QUESTION At what layer of the OSI model is ICMP implemented? ANSWER The network layer (Layer 3). QUESTION What is the meaning of an IP fragmentation summary value of 0? ANSWER A summary value of 0 indicates that the packet is complete and has not been fragmented. QUESTION What does the IP Time To Live value indicate? ANSWER The IP Time To Live value indicates the maximum number of router hops that the IP datagram will make before it is dropped from the network.
24. From the Capture menu, select Stop And View. In the Microsoft Network Monitor capture summary, note that a number of IP packets follow immediately after the ICMP packets and that Protocol = ICMP appears in the Description column, as shown in the figure below.
45
GL06XX03
QUESTION How many packets are associated with the first Echo: From packet? ANSWER Six additional IP packets are associated with the first Echo: From packet.
25. In the Microsoft Network Monitor capture summary, double-click the first instance of ICMP traffic, as indicated by the entry in the Description column that displays ECHO: From; expand the elements in the middle pane as appropriate; and then record the values for the following in the space below. FRAME: Total frame length: IP: Total length: IP: Fragmentation summary: IP: Fragment offset:
QUESTION What does the Total Frame Length value represent? ANSWER It represents the maximum allowable size of the Ethernet frame.
46
QUESTION Why does the IP Fragmentation summary list a value other than 0? ANSWER It indicates that the significant bits have been set for IP fragmentation. QUESTION What does the Fragment Offset value in this packet indicate? ANSWER The first Fragment Offset value is 0, indicating it is the first fragment of the datagram.
26. Select the remaining IP packets associated with the Echo: From packet; record the total IP length for each of them; and then add the values.
QUESTION What is the sum of the Total IP Length values? ANSWER They total approximately 10,000 bytes.
47
48
QUESTION What transport layer protocol is used for DNS queries? ANSWER UDP. QUESTION What is the destination port number for DNS queries? ANSWER UDP port 53. QUESTION Why is the source port listed as Unknown in the summary information? ANSWER It is a randomly assigned port number above 1024; that is, it is not a well-known port number. (UDP and TCP ports from 11024 have assigned values.) QUESTION What entries are listed under the DNS Question section of the packet, and what is their significance? ANSWER The DNS question name, along with the DNS question type and class, comprise the DNS query that is made to the DNS server.
8. In the Microsoft Network Monitor capture summary, select the second instance of DNS traffic, as indicated by the entry in the Description column that displays Std Qry Resp. Use the details of the captured frame to answer the following questions.
QUESTION What is the destination port for the DNS query response? ANSWER The destination port is the UDP port specified as the source port in the initial DNS request. QUESTION What is the source port for the DNS query response? ANSWER UDP port 53.
49
QUESTION What additional DNS section does the reply contain? ANSWER It contains an answer section. QUESTION What is the significance of the DNS Time To Live value? ANSWER The DNS Time To Live value indicates how long the record can be cached by the DNS requestor.
10. In the center frame of the Network Monitor capture window, expand TCP: Control Bits, and then record the values for the following fields in the space below. TCP: Sequence Number: TCP: Acknowledgement Number: The figure below shows you where to locate the Sequence Number and Acknowledgement Number fields.
50
GL06XX05
QUESTION In the captured frame, what does S stand for? Hint: Look in the TCP Flags entries for a field where the bit is set to 1. ANSWER It stands for synchronization, also known as SYN. QUESTION What is the purpose of the TCP Option Type and the TCP Option Length? ANSWER These options determine the maximum segment size that the sender wants to receive in reply to the packet.
11. Select the next TCP frame immediately below the one you examined in step 10 that displays Control Bits: .A..S. in the Description column, expand the appropriate objects, and then record the values for the following fields in the space below. TCP: Sequence Number: TCP: Acknowledgement Number:
51
QUESTION In the captured frame, what does A stand for? Hint: Look in the TCP Flags entries for a field where the bit is set to 1. ANSWER It stands for acknowledgement, also known as ACK.
14. Select the remaining DNS frames in sequence, and note their TCP: Sequence Number and TCP: Acknowledgement Number. You should note that a SYN flood attack exploits the mechanism that TCP uses to establish a session between two computers. In a SYN flood attack, the client computer sends a SYN request to the server, and the server subsequently sends a SYN-ACK to the client. However, instead of responding with an ACK, the client sends another SYN request to the server. This causes multiple half-open connections on the server, as the server waits for responses that never arrive to the SYN-ACK messages. If enough resources are consumed by the half-open connections, the result is a denial of service (DoS) attack.
QUESTION What is the purpose of the TCP frames you examined in steps 1012? ANSWER They synchronize sequence numbers for TCP transmissions in order to establish a session between hosts. Once the session has been established through the exchange of sequence numbers and acknowledgements, the TCP data segments are sent and acknowledged sequentially, using the sequence numbers to ensure correct delivery. QUESTION Collectively, the frames you examined in steps 1012 are commonly referred to as what? ANSWER Collectively, the frames are commonly referred to as a three-way handshake.
15. Select the last instance of DNS traffic, as indicated by the entry in the Description column that displays Std Qry Resp, and expand the DNS
52
GL06XX06
Review the details of the captured frame and then answer the following questions.
QUESTION What is the DNS Question Type? ANSWER Request for zone transfer. QUESTION What DNS records are listed in the DNS Answer section? ANSWER All the records for the contoso.com DNS domain name space.
53
GL06XX07
This frame is the beginning of the three-way handshake to establish the TCP connection for FTP.
QUESTION What are the source and destination ports that are listed in this frame? ANSWER The source port will be some value over 1024; the destination port is TCP port 21.
54
11. In the capture summary, double-click the first frame that displays FTP in the Protocol column.
QUESTION What is the relationship between the source and destination ports listed in this frame and the source and destination ports listed in the frame you looked at in step 10? ANSWER The source port for this frame is the destination port in the previous frame, and the destination port for this frame is the source port in the previous frame.
19. Switch to Network Monitor, and then select the frame that displays Data transfer to client in the Description column, as shown below.
GL06XX09
QUESTION What are the source and destination ports in this frame? ANSWER The source port is TCP port 20. The destination port is the same as the value that you calculated in steps 1518. QUESTION How did the remote FTP service know which port to use to transfer the data to the client computer? ANSWER The client informed the FTP service to establish the connection on this port in the frame you looked at in step 12.
55
Eavesdropping (sniffing)
ARP poisoning
Malformed URLs
Physical layer (Layer 1). The attacker must have access to the network cabling or wireless signal to listen to network traffic. Network layer (Layer 3). ICMP is implemented at the network layer. This attack no longer works except on the oldest systems. The target system is pinged with a packet that exceeds the maximum allowable size for a data packet (65,536 bytes). Network layer (Layer 3). ARP is implemented at the network layer. However, MAC addressing is implemented at the data-link layer, so another possible answer is the data-link layer (Layer 2). Application layer (Layer 7). HTTP is implemented at the application layer. By sending malformed URLs to a Web server, the attacker attempts to exploit Web server vulnerabilities. Transport layer (Layer 4). UDP and TCP ports are implemented at the transport layer. In a port scan attack, an attacker scans a target system for open and vulnerable UDP and TCP ports. A port scan attack is often performed as preparation for an active attack. Transport layer (Layer 4). The SYN flag occurs within TCP, which is implemented at the transport layer. In a SYN attack, the attacker sends a large number of multiple synchronization requests that contain bad or spoofed source IP addresses. The client system responds with SYN/ACK replies and waits for replies that never arrive, consuming valuable system resources.
56
Attack
OSI Layer
Spam attack
Network layer (Layer 3). IP provides routing and is implemented at the network layer. Network layer (Layer 3). ICMP is implemented at the network layer. The target system is flooded with ICMP packets. Application layer (Layer 7). A spam attack occurs when a large volume of unsolicited SMTP mail is sent to the target system. SMTP is implemented primarily at the application layer. Network layer (Layer 3). This attack exploits a vulnerability in the reassembly of packets in which the first IP fragment contains harmless data, but subsequent IP fragments with non-zero offsets overlap TCP header information and cause it to be modified. Fragmentation and reassembly are implemented as part of the IP protocol specification and are implemented at Layer 3.
2. As a result of a hardware failure, you had to replace a network interface adapter on a computer that is connected to the network through a switch. Now the computer cannot communicate on the network, even though the IP address configuration is correct. What is the problem?
ANSWER The switch probably has not updated its ARP cache, and this is preventing communication with the new network interface adapter.
57
5. Why is it a security risk to allow a DNS server to accept incoming connections on TCP port 53 from any host?
ANSWER TCP port 53 is used for transferring zone data; that is, the entire set of DNS records within the DNS zone. Attackers can use this information to footprint the network and subsequently gain sensitive information about computers and the organization itself.
6. Your organization wants to buy a new firewall to protect servers and applications that are running in your demilitarized zone (DMZ) and are available to users on the Internet. Some of these applications use secondary ports. What features should you look for in a firewall in relation to these applications?
ANSWER The firewall should be able understand applications that use secondary ports and make the appropriate modifications to the TCP/IP traffic to allow communication across the firewall for these applications, such as FTP.
7. You have an FTP client behind a simple Network Address Translation (NAT) device. You can connect to remote FTP servers, but you cannot transfer data from the FTP server. What is the likely reason for this problem?
ANSWER The most likely reason that data transfers are failing is that the NAT device is not opening ports so that the FTP server can initiate a connection from TCP port 20 to the FTP client. Furthermore, in the FTP request to initiate a data transfer, the internal IP address of the client is embedded in the payload. The FTP server can only connect to the external address of the NAT device; it cannot connect to the internal address of the FTP client.
58
59
FTP has a number of vulnerabilities, and its use should in general be avoided. For example, FTP is vulnerable to port theft, where an attacker can connect to the secondary port used for the transfer of data before the legitimate user can. Also, the standard FTP that ships with Microsoft Windows supports only basic authentication as an authentication mechanism, which cannot protect user names and passwords as they traverse the network. This said,PASV FTP is slightly more secure because it uses dynamic ports for transferring data. With normal FTP using the PORT command, the server initiates the TCP connection to the FTP client from a well-known (predetermined) port (TCP port 20). Furthermore, when FTP clients are behind a firewall and must use the PORT command, the firewall administrator must open up a wide range of ports to accept the incoming connection from the FTP server. This presents an unacceptable security risk for the firewall. PASV FTP is a more firewall-friendly protocol because the FTP client initiates the connection for data transfer, and the firewall will usually accept a return connection from the FTP server.
60
2. What question is being asked in the first frame of the captured traffic?
ANSWER What is the missing formula for RH3?
3. Do any of the frames contain users e-mail addresses? If so, what frames contain e-mail addresses?
ANSWER Yes, a number of frames contain e-mail addresses. The frame numbers that contain e-mail addresses are 5, 11, 14, 15, 17, 19, 21, 23, and 25.
4. Describe how to use the Find feature on the Network Monitor toolbar to search for text strings in the HTTP data.
ANSWER
1. Click Find. 2. In the Property tab, expand HTTP, and then select Data. 3. In the Relation column, select Contains. 4. Select the Hex or ASCII option, and then type the text in the Value box. 5. Click OK.
5. What frame contains the answer to the question posed in the first frame? What is the answer to the question?
ANSWER The answer is found in frame 8: The missing formula is E-Mc2.
8. What particular challenge does this kind of traffic present for the firewall administrator?
ANSWER This IM traffic uses unencrypted HTTP, which most firewalls will allow. To prevent this kind of IM traffic from traversing the firewall, you need to either block HTTP entirely or use a sophisticated firewall that can inspect the data payload of the
61
HTTP traffic and accept or deny the traffic based on the contents of the payload.
9. Assuming the organization has a sufficiently advanced firewall, what HTTP fields can a firewall administrator use to prevent this kind of IM traffic from traversing the firewall?
ANSWER The firewall administrator can block IM traffic that is tunneled through HTTP based on the content contained in the HTTP: User-Agent or HTTP: Content-Type field.
62
TROUBLESHOOTING LAB A:
63
Policy setting
Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit system events Access this computer from the network Allow log on locally Deny access to this computer from the network Shut down the system Devices: Unsigned driver installation behavior Interactive logon: Do not display last user name Interactive logon: Message text for users attempting to log on
Success, Failure Success, Failure Success, Failure Success, Failure Success, Failure Success Success, Failure Success Administrators, Authenticated Users Administrators, Backup Operators, Power Users ANONYMOUS LOGON, Guests Administrators Do not allow installation Enabled Unauthorized access is prohibited. If you are not an authorized user, do not attempt to log on. LEGAL NOTICE: Authorized Users Only
Success No auditing No auditing Success No auditing No auditing No auditing No auditing Backup Operators, Power Users, Users, Administrators, Everyone Backup Operators, Power Users, Users, Administrators
Backup Operators, Power Users, Administrators Warn but allow installation Disabled
Interactive logon: Message title for users attempting to log on Network security: Do not Enabled Disabled store LAN Manager hash value on next password change Network security: LAN Send NTLMv2 response only, Send NTLM response only Manager authentication Refuse LM and NTLM level
64
Policy setting
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Network security: Minimum session security for NTLM SSP based (including secure RPC) servers Shutdown: Clear virtual memory pagefile ANSWER
Require message integrity, Require message confidentiality, Require NTLMv2 session security, Require 128-bit encryption Require message integrity, Require message confidentiality, Require NTLMv2 session security, Require 128-bit encryption Enabled
No minimum
No minimum
Disabled
In Part 2 of this lab, students can use either Resultant Set of Policy (RSoP) or Security Configuration And Analysis to determine what might be wrong with the group policy that is applied to the ClassroomServers OU. Security Configuration And Analysis is particularly useful for troubleshooting group policy; by using this tool, students can compare the actual computer settings that are applied to the computer with the settings in the template file they created in Part 1 of this lab. The table below shows where the ideal settings in the TroubleShooting Lab A Answer.inf template file differ from the settings that are actually applied through the group policy object. In addition to determining the improper policy settings listed below, students need to also determine that the group policy has disabled a number of services related to Microsoft Internet Information Services (IIS). In particular, both the Web Publishing Service and the HTTP Secure Sockets Layer (SSL) services have been disabled. In their answers, students should give some indication that either or both of these services have been disabled.
Troubleshooting Lab A: Answer.inf setting Troubleshooting Lab A: Break.inf setting
Policy
Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit system events
Success, Failure Success, Failure Success, Failure Success, Failure Success, Failure Success Success
65
Policy
Allow log on locally Shut down the system Interactive logon: Do not display last user name Network security: LAN Manager authentication level Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
Send NTLMv2 response only, Send NTLMv2 response only, Refuse LM and NTLM Refuse LM No minimum
Require message integrity, Require message confidentiality, Require NTLMv2 session security, Require 128-bit encryption Network security: Minimum Require message integrity, Require message session security for NTLM SSP based (including secure confidentiality, Require NTLMv2 session security, RPC) servers Require 128-bit encryption Shutdown: Clear virtual Enabled memory pagefile
No minimum
Disabled
66
LAB 7:
SECURING COMMUNICATIONS
EXERCISE 7-1: CONFIGURING RRAS FOR REMOTE COMMUNICATIONS
Verifying Server Permissions for Enabling RRAS on a Member Server
7. Verify that your computer is listed in this group.
QUESTION By virtue of this configuration, all member servers in the classroom are members of the RAS And IAS Servers group. Why would this configuration be inappropriate in a production environment? ANSWER It is a good security practice to limit the number of services running on your network. By placing unnecessary servers in the RAS And IAS Servers group, you are potentially increasing the attack surface of your network if local administrators set up unauthorized RRAS servers that can authenticate domain accounts.
67
12. In the Advanced Security Settings dialog box, click the Data Encryption drop-down list and examine the choices, but do not change any of the settings.
QUESTION What is the most secure setting for data encryption? ANSWER The most secure setting is Maximum Strength Encryption (Disconnect If Server Declines).
16. In the Connect To Computer01 dialog box, type vpnuserx (where x is your student number) in the User Name box, type P@ssw0rd in the Password box, and then click Connect. The connection attempt fails.
QUESTION What error message did you receive? ANSWER The error message is Error 649: The Account Does Not Have Permission To Dial In.
19. In Event Viewer, click the System log, and then double-click the system event that displays 20189 in the Event ID column.
QUESTION What configuration changes do you need to make to enable remote access permissions for the user account? ANSWER You must grant the account remote access permissions through the properties of the Active Directory account object or through a remote access policy.
68
6. Review the following figure that shows the default dial-in settings for user accounts, and then answer the questions that follow.
GL07XX03
QUESTION Without changing the default settings of the dial-in user account, how would you grant the user remote access permissions? ANSWER You would grant the user remote access permissions through a remote access policy.
69
QUESTION The dial-in properties include a setting for assigning a static IP address. Why would it be useful to assign a static IP address to a remote user? ANSWER Answers will vary. From the point of view of security practices, it is useful to assign a static IP address to a dial-in user to make it easier to audit the users actions.
9. In the details pane, double-click the Connections To Microsoft Routing And Remote Access Server policy.
QUESTION What is the action if the connection request matches the policy conditions? ANSWER The default action is to deny access.
11. In the details pane, double-click the Connections To Other Access Servers policy.
QUESTION What are the policy conditions for denying remote access? ANSWER Connection requests will be denied based on the time of day. This policy will deny any connection request made at any time.
23. Click Start, select Connect To, click Computeryy (where yy is two-digit version of your partners student number), type vpnuserx (where x is your student number) in the User Name box, type P@ssw0rd in the Password box, and then click Connect.
QUESTION What can you infer about how remote access policies are processed? ANSWER Remote access policies are processed in order from top to bottom. As soon as a remote access policy condition is met, the processing of remote access policies stops.
70
25. At the command prompt, type ipconfig /all and then press ENTER.
QUESTION How many IP addresses are on your computer? What are they? ANSWER If only you have established a VPN connection with your partners computer, you should see two IP addresses on your computer: one for the network adapter, and one for the outbound Remote Access Service (RAS) connection. If both you and your partner have established a VPN connection with each others computers at the same time, you will see an additional address for the inbound RAS connection.
27. At the bottom of the output of the Route.exe command, identify the IP address that is listed as the default gateway.
QUESTION What IP address is listed as the default gateway? ANSWER The IP address used for the RAS connection.
30. On the Computeryy Status page, select the Details tab, and then review the information.
QUESTION What authentication method is being used? What is the encryption strength? ANSWER The authentication method is Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2). The encryption strength is 128 bits, using Microsoft Point-to-Point Encryption (MPPE).
71
9. In the Completing The Certificate Request Wizard page, review the information, click Finish, and then click OK.
QUESTION What are the intended purposes of the newly created certificate? ANSWER Client authentication and server authentication.
GL07XX04
QUESTION What is listed in the Authentication column in the details pane? ANSWER Certificate (RSA Signature ). QUESTION What security method is used for encryption? ANSWER Triple DES (3DES) is used for encryption.
72
QUESTION What security method is used for integrity? ANSWER Secure Hash Algorithm (SHA-1) is used for integrity.
4. In the tree pane, expand Quick Mode, and click Security Associations.
QUESTION What protocol and ports are used? ANSWER User Datagram Protocol (UDP) port 1701. QUESTION What security method is listed for Encapsulating Security Payload (ESP) confidentiality? ANSWER 3DES is used for encryption. QUESTION What security method is used for ESP integrity? ANSWER Hash Message Authentication CodesMessage Digest 5 (HMAC-MD5) is used for ESP integrity.
73
4. Locate and select the first frame that displays LCP in the Protocol column, and then highlight IP Protocol in the middle pane.
QUESTION What IP protocol type is used in this frame? Hint: Look at the description immediately to the right of IP: Protocol = ANSWER General Routing Encapsulation (GRE).
5. Locate and click the first frame that displays PPPCHAP in the Protocol column; then in the middle pane, expand the PPPCHAP row; and then click the PPPCHAP: Data row. In the bottom pane, note the information that is highlighted.
QUESTION What information is sent in clear text in this frame? ANSWER The name of the computer initiating the PPTP connection.
6. Locate and examine other instances of frames that display PPPCHAP in the Protocol column.
QUESTION What other information is sent in clear text in these frames? ANSWER The user name of the account used to initiate the PPTP connection.
7. Locate and examine the frames that display PPP in the Protocol column and MPPE/MMPC in the Description column.
QUESTION What do these frames represent? ANSWER These frames contain the data that is encrypted by MPPE and that is encapsulated within the GRE protocol.
74
10. In the Microsoft Network Monitor capture summary, locate and doubleclick the first frame that displays ISAKMP in the Protocol column.
QUESTION What transport protocol and destination and source port number are used for ISAKMP? ANSWER UPD is the transport protocol, and 500 is the port number.
11. In the same frame that you selected in step 10 above, in the middle pane, expand the ISAKMP row, and scroll down to the bottom of the middle pane.
QUESTION What are the ISAKMP payload types listed in this frame? ANSWER Security Association and Vendor ID.
12. Examine other frames that display ISAKMP in the Protocol column.
QUESTION Name at least four other ISAKMP payload types. ANSWER Some of the ISAKMP payload types include Key Exchange, Nonce, NAT Discovery, Certificate Request, and Fragment.
13. Locate and click the first frame that displays ESP in the Protocol column.
QUESTION What does ESP stand for, as indicated in the IP datagram? ANSWER Encapsulating Security Payload for IPSec. QUESTION What is contained within the ESP payload? ANSWER The ESP payload contains the encrypted data that is transmitted between the VPN client and server.
75
76
77
QUESTION What does WEP stand for? ANSWER Wired Equivalent Privacy.
78
6. Switch to the command prompt, type ping computerzz -n 10 (where zz is the number of another student computer in the classroom), and then press ENTER.
QUESTION Was the ping successful? Why or why not? ANSWER The computer with the default Client (Respond Only) IPSec policy assigned can ping the other classroom computer. The computer with the custom High Security Research Workstation IPSec policy will receive this message: Destination Host Unreachable. The reason for this is that all IP traffic to hosts other than the specific research workstation is blocked by the IPSec policy.
2. Which protocol, PPTP or L2TP, is more efficient for transmitting data? Provide reasons for your answer.
ANSWER L2TP/IPSec is less efficient for transmitting data because it uses more overhead for the encryption than PPTP does.
79
4. What are some of the advantages of using RADIUS authentication for VPN or dial-in access?
ANSWER Two primary advantages of using RADIUS are centralized authentication and centralized accounting. When RADIUS is not used, each RAS server can be considered a kind of authentication island, requiring the administrator to define dial-in policies and conditions on each RRAS server. Also, the administrator must consult RRAS logs on each server for troubleshooting and security auditing. By reducing administrative effort, RADIUS also helps to enhance security.
5. In the 802.1x configuration, you specify that the keys are provided automatically. What keys are provided automatically, and what are some of the advantages of providing these keys automatically?
ANSWER The keys that are provided automatically are WEP keys. One advantage of distributing the keys automatically is that the users do not have to manually enter keys. This eliminates problems that result from user error. More importantly, security of the keys is greatly enhanced because the keys are transmitted over a secure channel, which helps to eliminate problems resulting from intentional or unintentional disclosure of keys to unauthorized third parties.
9. How can you protect the traffic between a dial-in server and a RADIUS server?
ANSWER You can protect the traffic with IPSec.
80
81
Windows Group is equal to SalesStaff. The profile of the policy should be set to disconnect the session if it is idle for more than five minutes. The authentication method should be set to MS-CHAPv2, and only the check box for strongest encryption (128-bit MPPE) should be selected. The next remote access policy should be one that denies access to SalesManagers. No other condition should be specified. The final remote access policy should be one that allows access to the wireless network for the SalesStaff group between the hours of 7:00 A.M. and 6:00 p.m. This remote access policy includes three policy conditions: The NAS-Port-Type matches the wireless network types, and The Windows group is equal to SalesStaff, and The time of day is between 7:00 A.M. and 6:00 P.M. on weekdays The effect of the policy conditions is that only members of the SalesStaff group who connect to the network with a wireless device between the hours of 7:00 A.M. and 6:00 P.M. will be granted access.
82
LAB 8:
8. In both Internet Options dialog boxes, select the Security tab, and then compare the respective security level settings for each of the Web content zones.
QUESTION What is the difference in security level settings for the Internet and Trusted Sites zones between both instances of Internet Explorer? ANSWER In the Enhanced Security Enabled configuration, the security level settings for the Internet and Trusted sites zones are High and Medium, respectively. In the Enhanced Security Disabled configuration, the security level settings for the Internet and Trusted Sites zones are Medium and Low, respectively.
83
9. In the instance of Internet Explorer that is enabled for Enhanced Security, select Local Intranet, and then click Custom Level; in the Settings dialog box, scroll to the bottom and locate the settings for User Authentication. Note the settings.
QUESTION What is the setting for User Authentication Logon? ANSWER Anonymous Logon.
13. In the Security tab, ensure that Local Intranet is still selected, click Custom Level, and review the settings for User Authentication.
QUESTION What is the setting for User Authentication Logon? ANSWER Automatic Logon Only In Intranet Zone.
15. Click the Internet zone, and then click Custom Level. Note the settings.
QUESTION What is the setting for User Authentication Logon? ANSWER Anonymous. QUESTION If the setting were changed to Automatic Logon With Current Username and Password, what would happen when a user connected to a site that required NTLM authentication? ANSWER The authentication credentials would be sent automatically.
84
16. In the Authentication Methods page, clear the Enable Anonymous Access check box, click OK, and then click OK again to close the Integrated Properties dialog box.
QUESTION What authentication methods are selected by default when you create a virtual directory? ANSWER Anonymous and Windows Integrated Authentication are selected by default.
85
Capturing and Analyzing Basic and Integrated Authentication by Using Network Monitor
12. In the Microsoft Network Monitor capture summary screen, double-click the first frame that displays Status Code 401 in the Description column, expand HTTP in the middle pane (as shown below), and then examine the details of the HTTP payload.
GL08XX04
QUESTION What is listed as the authentication method? ANSWER HTTP: WWW-authenticate = Basic realm = computeryy
14. With HTTP: GET Request From Client expanded in the middle pane, locate the header field labeled HTTP: Authorization and examine the contents of the field.
QUESTION What does this field contain? ANSWER This field contains an alphanumeric string that represents the Base64 encoded user name and password used to log on to the virtual directory.
86
15. In the top pane, immediately below the frame you examined in step 14, select the first frame that displays Status Code = 200.
QUESTION What does a status code of 200 indicate? ANSWER A status code of 200 indicates that the connection to the Web page is successful.
16. In the top pane, immediately below the frame you examined in step 15, select the frame that displays Status Code 401 in the Description column; in the middle pane, ensure that HTTP: Response To Client is expanded; and then locate the two fields that are labeled HTTP: WWWAuthenticate.
QUESTION What authentication methods are listed in the HTTP payload? ANSWER HTTP: WWW-authenticate = Negotiate and HTTP: WWW-authenticate = NTLM.
3. In the Application Management Properties (Local Computer) dialog box, select the Start Up Type drop-down list.
QUESTION What are the three possible Start Up types? ANSWER Automatic, Manual, and Disabled.
87
4. Leave the Start Up type set to Manual, and then in the Application Management Properties (Local Computer) dialog box, select the Dependencies tab.
QUESTION Are there any service dependencies? ANSWER There are no service dependencies.
6. In the details pane of the Services console, double-click Distributed File System, note its startup type, and then read the description of the service.
QUESTION Why would it be a good idea to disable this service on a dedicated Web server? ANSWER This service is unnecessary on a dedicated Web server. The distributed file system service provides a logical, single point of access for file shares that are distributed across the internal network. A Web service provides this service for external clients by default.
4. In the Web Service Extensions details frame, click the Open Help link, and then read the corresponding article on enabling and disabling dynamic content.
QUESTION What is the default configuration of IIS 6.0 for delivering dynamic content? ANSWER By default, IIS 6.0 delivers only static content. IIS 6.0 must be explicitly configured to allow dynamic content.
88
Creating and Implementing Application Pools to Enhance Reliability, Performance, and Security of Web Sites
7. Select the Performance tab, and then in the Web Garden area, select 3 in the Maximum Number Of Worker Processes spin box.
QUESTION What is a Web Garden? ANSWER A Web garden is an application pool that uses multiple worker processes.
8. Select the Health tab, and then review the default settings.
QUESTION What is a primary purpose of the settings in this tab? ANSWER The primary purpose is to ensure reliability when worker processes fail.
9. Select the Identity tab, and then select the Predefined drop-down list box.
QUESTION What are the three predefined accounts? ANSWER The three predefined accounts are Network Service, Local Service, and Local System.
89
29. Open Internet Explorer, type http://computeryy:8000 in the Address box (where yy is the two-digit version of your lab partners student number), and then press Enter. You should see your partners default.htm file for the Web Services Web site.
QUESTION If this Web server hosted a .Net Web service application and the application failed, what would happen to other Web sites located on the same computer? ANSWER The other Web sites would not be affected if the application failed.
8. Double-click the How DNS Query Works search result title, read the article, and then answer the following questions.
QUESTION What is recursion? ANSWER Recursion is the process that occurs when a DNS resolver, such as a DNS client, queries a DNS server to provide name resolution. The DNS client will wait for a response to the query from the DNS server. If the DNS server does not have the answer to the query in its cache or its local database (also known as a zone file), it will perform additional DNS queries to other DNS servers on behalf of the client in an attempt to resolve the name.
90
QUESTION If you disabled recursion on the DNS server, what DNS queries would the DNS server respond to? ANSWER If you disabled recursion, the DNS server would respond positively only to DNS queries for any host nametoIP address mapping in its local database, also known as a zone file. That is, it would not perform queries for hosts in remote DNS domains of which it had no local knowledge.
24. In the yourprimarydomain.com Properties dialog box, select the Zone Transfers tab.
QUESTION What are the default settings in the Zone Transfers tab? ANSWER The default settings are to allow zone transfers only to servers listed on the Name Servers tab.
91
3. What aspect of the CIA (confidentiality, integrity, and availability) triad can Web application pools enhance?
ANSWER Availability.
92
4. One of the default settings for the Internet zone is to prompt for a user name and password. Why is this an appropriate setting for the Internet zone?
ANSWER When this setting is disabled, Internet Explorer automatically sends a response to an NTLM challenge issued by a Web server without the users knowledge. A rogue Web site administrator can extract significant information from the response to the known challenge that her Web site issued. By prompting for authentication credentials, users are alerted to potential security issues on unfamiliar Web sites.
5. Why should you restrict zone transfers to only a predetermined and authorized list of DNS servers?
ANSWER To mitigate DNS footprinting attacks. In a DNS footprinting attack, an attacker copies the entire zone file from the DNS server. The attacker can subsequently gain information about your network and organization by the information implicit in host names and IP addresses.
6. Creating multiple secondary DNS servers to hold read-only copies of the primary zone enhances what aspect of the CIA (confidentiality, integrity, and availability) triad?
ANSWER Availability.
7. In addition to restricting zone transfers to a predetermined list of DNS servers, what other steps should you take to protect zone data?
ANSWER If zone information is being transferred over the Internet, you should encrypt the zone data transfer. Also, you should configure firewall rules to prevent unauthorized external hosts from connecting to your DNS server to request a zone transfer.
8. Enabling the setting to protect against DNS cache pollution enhances what aspect of the CIA (confidentiality, integrity, and availability) triad?
ANSWER Integrity. Cache pollution occurs when a rogue DNS server attempts to corrupt the DNS server cache with bogus records.
93
9. If you use basic authentication, what should you do to protect the confidentiality of authentication credentials?
ANSWER You should configure the Web server with a digital certificate to encrypt the authentication session.
94
For the first part of this lab challenge, you will design the DNS infrastructure based on your responses to the following questions. If required by your instructor, write up a formal proposal based on your responses to these questions and be prepared to hand it in. 1. Should you separate DNS server roles? If so, what roles would you separate and why?
ANSWER Yes, DNS server roles should be separated. One set of two DNS servers should be configured to perform recursive queries for the proxy server. The other set of DNS servers should be configured to resolve queries for hosts in the contoso.com domain but not perform name resolution for other domains (recursion disabled).
2. If you answered yes to question 1, will you need to install additional DNS servers?
ANSWER Yes. You should buy at least one and preferably two more DNS servers.
3. How can your ISP help you enhance the fault tolerance of the contoso.com zone?
ANSWER The ISP can host secondary zone files for contoso.com to eliminate a single point of failure, since it will be on a different subnet.
4. How can your ISP help you enhance the performance of DNS queries from internal DNS resolvers?
ANSWER You can configure the DNS servers used for external name resolution to forward requests to the ISPs DNS servers. Also, you can configure the Web proxy server with the IP addresses of the ISPs DNS servers.
95
5. Based on your responses to the previous questions, how would you configure inbound and outbound access rules for DNS traffic on your firewall?
TIP DNS uses User Datagram Protocol (UDP) port 53 for queries and Transmission Control Protocol (TCP) port 53 for zone transfers. ANSWER On the DNS servers that perform resolution on behalf of the Web proxy client, the firewall should be configured to allow outbound UDP port 53 traffic to any external host (or to the ISPs DNS servers if you want to configure the DNS servers to forward this traffic). For DNS resolution for the contoso.com name space, the firewall should be configured to allow inbound UDP port 53 traffic from any Internet host to DNS servers hosting the contoso.com zone file. Also, the firewall should be configured to allow TCP port 53 traffic to and from the ISPs DNS servers that are hosting a secondary zone file.
96
LAB 9:
97
G09XX02
QUESTION In what circumstances is relaying permitted? ANSWER When an e-mail client or server successfully authenticates to the SMTP service.
98
99
20. Click the top frame in the Summary window, and then press the Down arrow to review the contents of subsequent frames in the Detail and Hex windows.
QUESTION Do any of the frames contain potentially sensitive information that is viewable in clear text? If so, what information do they contain? ANSWER The contents of the message are viewable.
100
101
2. How can preventing unauthorized SMTP relaying reduce denial of service (DoS) attacks?
ANSWER Some spammers send extremely large volumes of e-mail. If a spammer sends a large volume of e-mail over an open relay, the SMTP service could be overwhelmed and be unable to process legitimate inbound and outbound e-mail.
4. You have configured Outlook Express to connect to a POP3 server. When you send an e-mail from a POP3 client, what protocol does Outlook Express use?
ANSWER The client uses SMTP to send the e-mail.
5. When you configure a POP3 client to use SPA, is the confidentiality and integrity of the message protected?
ANSWER No. SPA only protects the confidentiality of the password.
102
2. You are sending an encrypted e-mail. What is used to encrypt the e-mail: the recipients public key, the recipients private key, your public key, or your private key?
ANSWER You encrypt the e-mail with the recipients public key.
103
LAB 10:
5. Type netstat na and then press ENTER. The output of the command shows the protocol used (TCP or UDP), the TCP or UDP port number, the local and foreign (remote) address, and the connection state for TCP connections (Listen, Establish, Time_Wait, and so on). The port number is the TCP or UDP port number and is indicated by the number immediately to the right of the IP address. For example, UDP 0.0.0.0:53 indicates that UDP port 53 is in use, which is the port used for DNS query requests.
QUESTION List the open TCP ports that have a value below 1024. ANSWER Results will vary. Typical results will be 21, 25, 53, 80, 110, 135, 139, 443, and 445. QUESTION List the open UDP ports that have a value below 1024. ANSWER Results will vary. Typical results will be 53, 123, 135, 137, 138, 445, and 500.
104
18. Click Start, select Run, type notepad c:\lab manual\lab 10\labwork\netstat.log in the Open box, and then click OK.
QUESTION What information is listed in the Netstat.log file? ANSWER The file lists a history of active connections at five-second intervals. You might see connections with both your lab partners and the instructors computers.
105
EXERCISE 10-3: CREATING PACKET FILTERS BY USING ROUTING AND REMOTE ACCESS SERVICES
Testing Inbound Filters
2. In the command prompt, type ping computeryy (where yy is the twodigit version of your lab partners student number), and then press ENTER.
QUESTION What Ping response message did you receive? ANSWER Request Timed Out.
5. Wait until the scan is finished, and then click Expand All.
QUESTION What does the red X in the Scan Results window indicate? ANSWER The red X indicates that a ping of the target computer failed. QUESTION Why do you not see an open port for the DNS server (53)? ANSWER The destination port (TCP port 53) has been explicitly blocked by the RRAS filter. Any traffic with a destination port of TCP port 53 is dropped by the packet filters.
106
33. Wait until the scan is finished, and then review the scan result output. Minimize Super Scan 3.0.
QUESTION Why isnt there an open port for the DNS server (53)? ANSWER The destination port (TCP port 53) has been explicitly blocked by the IPSec filter.
21. Wait until the scan is finished, and then review the scan result output. In the scan results, you should see an open port for the DNS server (53). If you do not see this port in the output of the scan results, review your configuration, paying special attention to the filter action for the Allow DNS From The Lab Partner IP Filter List rule. You might also need to restart the Policyagent service.
QUESTION Why do you see an open port for the DNS server (53)? ANSWER Your IP address has been allowed access to this port on your lab partners computer.
107
2. In the output of the Netstat a command, what does the LISTENING state indicate?
ANSWER It indicates that the port is open and ready to accept connections.
3. Why is it a good idea to perform port scans of internal company computers on a regular basis?
ANSWER A remote port scanner can be useful for detecting the presence of Trojan horse programs and other malware that open unauthorized ports.
4. Why is it a good idea to create packet filters for outbound as well as inbound traffic?
ANSWER Limiting outbound traffic is an effective way of enforcing company policies regarding the appropriate use of the Internet. For example, if you do not want to allow any internal clients to connect to FTP servers on the Internet, you can use outbound filters to prevent FTP traffic that originates on your internal network from being forwarded to the Internet. Furthermore, a large number of exploits install software on target computers that cause them to communicate with unauthorized hosts on the Internet. For example, the Slammer worm caused infected computers to try to infect other computers on the Internet using UDP.
108
If more firewall administrators had prevented unnecessary traffic from being forwarded to the Internet from internal hosts, the damage caused by the Slammer worm, or for that matter the Sasser worm, would have been less severe.
5. What advantage does packet filtering in IPSec have over packet filtering in RRAS?
ANSWER IPSec has a more granular configuration than RRAS.
6. When you create an IPSec IP filter, what effect does selecting the Mirrored option have?
ANSWER When you select the Mirrored option, IPSec creates an additional filter that is the exact opposite of the filter you create. So, for example, if you create a DNS filter with a Destination Address of My Address and a Source Address of Any Address, an additional filter with a Destination Address of Any Address and a Source Address of My Address is created.
Before beginning this lab challenge, you might need to reconfigure the computer that will act as the PPTP client to use PPTP, rather than Layer Two Tunneling Protocol (L2TP), to connect to the RRAS server. See Lab 7, Securing Communications, for details on reconfiguring your client to use PPTP. Also, this lab challenge requires that you determine what ports are used for RADIUS accounting and authentication. To determine what ports are used for RADIUS accounting and authentication, you can use Network Monitor to capture traffic related to RADIUS authentication. Alternatively, you can load the C:\Lab Manual\Lab 10\Pptp-radius.cap file in Network Monitor to determine this information. It would also be helpful to consult the Microsoft Windows Help files before doing this lab challenge. You recently installed a dedicated RRAS and Internet Authentication Service (IAS) server in your perimeter network. Employees will use this server to establish virtual private network (VPN) tunnels to the corporate network using Point-to-Point Tunneling Protocol (PPTP). This server also uses RADIUS to perform a centralized authentication function for other VPN servers. Because this is a dedicated server,
109
you want to ensure that only essential outbound or inbound traffic related to PPTP and RADIUS is allowed on the Internet-facing network interface of this computer. For this lab challenge, work with your lab partner to configure one of your servers with the appropriate packet filters to drop all inbound and outbound traffic except for traffic related to PPTP and RADIUS. Record the packet filter configuration you create in the Lab10Worksheet.doc, which you can find in the C:\lab manual\Lab 10 folder. When you have completed the worksheet, save it as C:\Lab Manual\Lab 10\Labwork\YourLastName-Lab10-PPTP-filters.doc (where YourLastName is your last name). If your instructor requires you to submit the file for evaluation, he or she will provide additional instructions for submitting it. If time permits, remove the packet filters on the RRAS server and re-create the RRAS configuration on the other computer.
IMPORTANT Because you are creating RRAS packet filters on a computer with only one network interface adapter, you might experience delays in accessing the properties of the network interface adapter in RRAS after you have implemented the filters. You might have to wait a short time to open up the property pages after implementing the filters. After completing this lab challenge, remember to remove the packet filters to restore your computer to its original configuration. ANSWER The minimum set of filters are as follows, where x is the last octet of the IP address of the RRAS server, y is the last octet of the address of the RADIUS server, and /32 represents a subnet mask of 255.255.255.255. The configuration will work with the addition of packet filters for RADIUS accounting (UDP 1813), but if you completed all of Lab 7, Securing Communications, packet filters for RADIUS authentication (UDP 1812) are required. Inbound Filters Source Address = Any, Destination Address = 10.1.1.x/32, Protocol = TCP, Destination Port = 1723 Source Address = Any, Destination Address = 10.1.1.x/32, Protocol = Other, Protocol Type = 47 Source Address = Any, Destination Address = 10.1.1.x/32, Protocol = TCP [established], Source Port = 1723 (optional) Source Address = 10.1.1.y/32, Destination Address = 10.1.1.x/32, Protocol = UDP, Source Port = 1812 Source Address = 10.1.1.y/32, Destination Address = 10.1.1.x/32, Protocol = UDP, Source Port = 1813
110
Outbound Filters Source Address = 10.1.1.x/32, Destination Address = Any, Protocol = TCP, Source Port = 1723 Source Address = 10.1.1.x/32, Destination Address = Any, Protocol = Other, Protocol Type = 47 Source Address = 10.1.1.x/32, Destination Address = Any, Protocol = TCP [established], Destination Port = 1723 (optional) Source Address = 10.1.1.x/32, Destination Address = 10.1.1.y/32, Destination Port = UDP 1812 Source Address = 10.1.1.x/32, Destination Address = 10.1.1.y/32, Destination Port = UDP 1813
111
LAB 11:
112
Power strip
128-Kbps connection to Internet Router Domain controller ISA Server 2000 firewall
Telephone Telephone
You are concerned about the lack of physical security of the domain controllers and other servers in some of these offices. Because of the size of the Active Directory directory service, the design of Active Directory and the speed of the WAN links, it is not practical to remove the domain controllers from these remote offices. Doing so would result in excessively long logon times, resulting in a loss of productivity. Furthermore, having domain controllers at the branch offices increases fault tolerance and the availability of Active Directory.
G11XX01
113
You have brought your concerns to management. They agree that the physical security of the domain controllers needs to be enhanced throughout the company and are willing to provide a budget for the improvements. However, before a budget is approved, management wants to see a list of recommendations that will be incorporated into a revised security policy that will outline the minimum standards for physically securing domain controllers at all offices. Management has asked you to provide this list of recommendations. Because the recommendations need to cover the minimum requirements for physically securing all domain controllers, they need to take into account local conditions. In your preliminary research, you have learned that in all locations the lease agreements allow you to make physical changes to the offices, including reconfiguring office space, adding new wiring, and changing ventilation ducts. However, providing 24-hour onsite security personnel is not possible or economical at all locations. The following list of questions will help you compile your list of recommendations. You should, however, go beyond the provided questions to create your final list.
QUESTION If 24-hour onsite security is not possible in all locations, what other measures can you use to provide constant monitoring? ANSWER You can rewire all the offices so you can install alarm systems and closed-circuit television (CCTV) systems. With a CCTV system, the office can be monitored offsite by a third-party security company. QUESTION In cases where the network administrator shares office space with the servers, what changes should you make? ANSWER Because your lease agreements allow you to physically reconfigure the office space, dedicated rooms should be built for the servers. QUESTION What measures can you take to restrict physical access to rooms where the servers are located? ANSWER At the very least, offices should have physical locks. For a locked, high-security server room, a lock that requires multi-factor authentication is the best choice. For example, you could install smart card readers that require network administrators to swipe a card and enter a personal identification number (PIN) number. Also, you could install a biometric scanner that requires a PIN number or password to control access.
114
QUESTION Is the plenum space a concern? If so, how would you deal with it? ANSWER If local building codes permit it, you should build walls that extend completely from the floor to the ceiling (slab to slab). QUESTION Should you log access to the server room? If so, how would you do this? ANSWER Yes, it would be desirable to log access to the server room. You could rely on a sign-in and sign-out sheet. However, you should install an electronic system that can both control access and keep an automatic record of that access. Furthermore, you should use devices that record both who enters and leaves the room; that is, the electronic system must be installed on both sides of the door. QUESTION Who should have access to the server room? ANSWER Only network administrators with the appropriate security clearance. QUESTION Would any changes to the heating or air conditioning system be required? ANSWER Yes. Servers should be kept in an air conditioned environment that maintains an optimal temperature. This might require installing new air conditioning vents and adjusting air flow. Furthermore, the heating, ventilation, and air conditioning system (HVAC) should be designed so that air flow to the server room can be automatically shut off, in the event of a fire, to dampen or extinguish the fire as soon as possible by depriving it of oxygen. QUESTION If it is necessary to build or modify a server room, what consideration should you give to the power requirements? ANSWER Many industrial-strength uninterruptible power supply (UPS) devices require 220-volt power, rather than 110 volt. You need to ensure that the room is wired appropriately to accommodate these devices. If possible, the electrical power should be conditioned before it enters the server room and should be on a separate circuit from the rest of the office.
115
QUESTION What recommendations would you make for a fire suppressant system? ANSWER Where possible, the fire suppressant system should not damage equipment with water or foam. FM-200, which is a replacement for the potentially dangerous and older Halon systems, is an example of a fire suppressant system that would not damage equipment. You can also use a mix of fire suppressant systems. For example, an FM-200 fire suppressant system could be the first system to be triggered in the event of a fire alarm. If the fire reaches a predefined temperature, a wet-pipe or dry-pipe sprinkler system could subsequently be activated. With a dry-pipe system, water is only forced into the pipes once a certain temperature is reached. QUESTION How would you deal with risks that some fire suppressant systems create, in particular those fire suppressant systems that extinguish the fire by removing oxygen from the environment? ANSWER Because some fire suppressant systems displace oxygen, employees will require evacuation training. QUESTION Why should you include in your plan an emergency shutdown procedure for computers in your server room in the event of a fire? ANSWER You should include an emergency shutdown procedure for computers to mitigate the loss of data if the power is suddenly terminated, either deliberately or as a result of fire damage.
116
G11XX02
QUESTION What option in the Startup Key dialog box provides the greatest security? ANSWER The Store Startup Key On Floppy Disk option provides the greatest security, if the floppy disk is stored in a secured location.
117
118
QUESTION Will formatting the hard drives prevent recovery of sensitive data? ANSWER Unless you do multiple low-level formats of Small Computer System Interface (SCSI) drives, formatting will not prevent the recovery of data. Data from reformatted Integrated Device Electronics (IDE) drives can be recovered easily. QUESTION What measures should you take to ensure that data cannot be recovered from the donated hard drives? ANSWER Short of physically destroying the hard drives, you should use a utility that can overwrite all the sectors of the hard drive with random characters. You should overwrite all sectors with random characters multiple times. QUESTION Some of the server hard drives contain highly sensitive information. Would you recommend that these hard drives be donated? ANSWER No. You should thoroughly erase the data on these hard drives by using a special utility designed especially for that purpose, and then the drives should be physically destroyed, for example, by drilling holes in them or immersing them in acid. If the data is valuable enough, industrial spies might be willing to use very sophisticated, advanced, and expensive techniques to find data remnants. QUESTION What should you do to ensure that data cannot be recovered from the backup tapes? ANSWER At the very least, you should overwrite the tapes by using a special deletion program that can overwrite the data multiple times. Degaussing the tapes, while effective, might not entirely prevent the recovery of raw data. QUESTION Would you include the backup tapes in the donated items? ANSWER If the tapes contain highly sensitive information, the best way to mitigate the risk is to thoroughly erase the data and then physically destroy them. Although the company expressed a desire to donate these items, it is not unreasonable for security considerations to override charitable impulses in this situation. Furthermore, as part of its stated intentions, the company is under no obligation to supply these items as part of the donation.
119
QUESTION There are a number of utilities designed to thoroughly erase data. Should you recommend specific utilities? ANSWER Yes. Not all of these utilities are equal. You should recommend a list of approved utilities.
11. In the Performance console, select the Physical Disk: %Disk Write Time counter you added in step 7, press CTRL+H to highlight the real-time performance activity in the graph, and observe the activity. Then, using the up and down arrows, look at their values.
QUESTION Do the counters indicate intensive disk activity? ANSWER Yes. The Cipher /w command causes data to be written to unallocated sectors of the physical disk.
12. Switch to the command prompt, and then wait for the command to finish.
QUESTION What three write operations did the Cipher /w command perform? ANSWER The three write operations are to write 0x00, then write 0xFF, and then write random numbers to unallocated space on the volume.
120
121
QUESTION If you bought backup software that had specific plug-ins for SQL 2000 databases, what effect would it have on the rate of backups and restores? ANSWER It would likely shorten backup and restore times. QUESTION Assuming that catastrophic failure means the complete destruction of the computer for example, if there were a fire in the server roomwould you be able to build a computer, load an operating system, install SQL, and restore the data within an hour? If not, what solution can you recommend? ANSWER You need a computer that serves as a standby SQL server and can be brought into production at a moments notice. Also, you should consider clustering and server mirroring solutions to provide high availability and fault tolerance.
EXERCISE 11-6: BACKING UP AND RESTORING DATA USING THE INCREMENTAL BACKUP TYPE
Performing Normal and Incremental Backups
2. From the View menu, select Details, and then note the file attributes in the Attribute column.
QUESTION What attribute type is listed in the Attributes column for each file? ANSWER The attribute type is A (or Archive). When a file is added or modified, the Archive bit is turned on, indicating the need for a backup.
14. Switch to Windows Explorer, and then view the attributes of the files in the C:\Lab Manual\Lab 11\Backup folder.
QUESTION How have the file attributes changed? What does this indicate? ANSWER The A (or Archive) bit has been removed. This indicates that the files have been successfully backed up, so the need to archive (back up) the files is no longer required.
122
15. Double-click one of the files to open it in Notepad, press ENTER to make a change to the file, save the file, close Notepad, and then view the file attribute.
QUESTION Did the file attribute on the file change? ANSWER Yes, the A (or Archive) bit was added.
23. Switch to Windows Explorer and view the attribute on the file you modified in step 15.
QUESTION Did the file attribute on the file change? ANSWER Yes, the A (or Archive) bit was removed. QUESTION If you had performed a differential backup, would the file attribute have changed? ANSWER No. A differential backup does not alter the status of the Archive bit when it backs up files.
2. Although tools now exist that can run brute-force attacks on Syskeyprotected accounts databases, why is it still a good idea to enable Syskey?
ANSWER It is always a good idea to layer security. A Syskey-protected SAM database is harder to crack than one that isnt protected with Syskey.
123
3. When you delete a file from a hard drive, what actually changes on the hard drive itself?
ANSWER The only thing that changes is the file table (MFT in the case of NTFS, or FAT in the case of DOS). The file table contains pointers to where the file physically exists on the hard drive. The file itself may be spread over many noncontiguous sectors of the hard drive. When you delete the file, the file table marks the area occupied by the file on the hard drive as available for writing. Until the areas of the hard drive occupied by the file are overwritten, the file is still recoverable.
5. You are considering a backup solution for a number of critical servers on your network. List three or four factors you should consider before deciding on a solution.
ANSWER Answers will vary. Some possible responses are: The speed of the backup and restore operations The speed of the network, for remote backup and restore jobs The amount of data to be backed up The capacity of the media used to back up data The speed at which autoloaders can load tapes The data transfer rates within the computer itself
124
125
126
LAB 12:
17. Click Start, select Run, type wmplayer.exe in the Open box, and then click OK.
QUESTION What message did you receive? ANSWER You received a message that Microsoft Windows could not open the program because of a software restriction policy.
127
QUESTION What is the default maximum size of the file cache? ANSWER On computers running Windows XP, the default maximum size is 50 MB. On computers running Microsoft Windows 2003, the default maximum size is unlimited. QUESTION What is the default location of the folder holding the protected files? ANSWER The default location is %Systemroot%\System32\Dllcache.
128
3. You want to install some legacy third-party software on a computer running Windows XP. However, you have been told that this software overwrites some system files with its own versions of the files. Will you be able to install the software? Why or why not?
ANSWER You will not be able to install the software. WFP will detect the change in the system file caused by the installation program and replace the file with the version verified for use in Windows. In order for software vendors to qualify for the Window XP logo, their software must pass some rigid tests, such as not replacing system files.
129
4. Why is it a good idea to restrict the ability to add Web sites to the Trusted and Intranet Security zones?
ANSWER Internet Explorer security is lower for these zones and will generally allow code from the Web sites to be executed. If you restrict the ability to add Web sites to these zones, you reduce some of the threats from malicious Web sites on the Internet.
5. Tools such as Msinfo32.exe and Systeminfo.exe are very good tools for documenting system configurations in a small environment, but they have a number of limitations that make them inappropriate for storing and analyzing information for a large number of systems. In a large environment, you would probably want to use other tools to inventory hardware, software, and system configuration. What limitations make Msinfo32.exe and Systeminfo.exe inappropriate for storing and analyzing information for a large number of systems? What capabilities would you want in tools that can collect hardware and software configuration information for a large number of computer systems?
ANSWER Msinfo32.exe and Systeminfo.exe lack the ability to output information in a format that can be easily imported into a database or spreadsheet for analysis and linking with other information, such as asset tags. In a large environment, you would want inventory software that can automatically query computers and store information in a database. This makes it easier to track assets, monitor software license consumption, and so on.
6. One of your company policies states that employees should not disable the settings in Microsoft Outlook Express that strip dangerous attachments from e-mails. What is the best way to enforce that policy?
ANSWER Use a group policy to prevent employees from changing the option.
130
131
ANSWER The most efficient way to meet the requirements for this lab challenge is to remove the Security, Privacy, Connections, and Advanced pages from Internet Options. These pages are disabled under \User Configuration\Administrative Templates\Windows Components\Internet Explorer\Internet Control Panel. The History and Home Page settings must be disabled under \User Configuration\ Administrative Templates\Windows Components\Internet Explorer. The screen shot should show only the General, Content, and Programs pages. On the General page, the options to change the home page and history settings should be grayed out. The sample screen shot below shows the appropriate configuration after students have successfully completed the lab challenge.
132
LAB 13:
10. In the details pane, right-click Audit Logon Events, select Help, and then read the description.
QUESTION What audit settings are necessary to record a logon event on both the workstation and a domain controller when a domain account is used to log on to the domain from the workstation? ANSWER The Audit Account Logon Event and the Audit Logon Events settings must be enabled.
16. In the tree pane, right-click the Security log, select Properties, examine the settings, and then answer the following questions.
QUESTION What is the default maximum size of the Security log? ANSWER The default maximum size is 16,384 KB. QUESTION What will happen if the size of the entries in the Security log reaches the maximum threshold for the size of the log file? ANSWER Given the default configuration, the oldest events will be overwritten by new events.
133
6. Click OK to clear the warning message, and then select the other logs in Event Viewer.
QUESTION Why can you view other logs, but not the Security log? ANSWER The Security log contains sensitive information that you can access only when you are logged on with administrative credentials.
11. On the Event Properties page, click the down arrow until you reach the bottom of the log file, and then answer the following questions. When you reach the bottom of the log file, an Event Viewer dialog box appears, prompting you to proceed to the beginning of the log file. Select No.
QUESTION What three event categories do you see? ANSWER The three event categories are Privilege Use, Logon/Logoff, and System Event. QUESTION Do you see an event that indicates the Security log was cleared? ANSWER Yes. The System Event records an event ID of 517, indicating the Audit log was cleared.
134
QUESTION Do you see any events indicating the use of the alternative Run As credentials? ANSWER Yes. Event IDs 528 and 552 indicate the use of alternative credentials. QUESTION Do you see any events indicating that a user with nonadministrative credentials attempted to access the Security log? ANSWER No. The initial attempt by the Userx account to access the Security log is not recorded.
14. In the details pane, right-click Audit Privilege Use, select Help, and then read the description of the Audit Privilege Use policy setting.
QUESTION What kinds of events will cause an audit record to be generated in the Security log if you enable the Audit Privilege Use policy setting? ANSWER An audit record will be generated in the Security log when users try to exercise a user right, such as changing the system time or shutting down the computer.
17. On the Audit Privilege Use Properties page, select the Failure check box, and then click OK.
QUESTION You could also enable the Success setting. What is a disadvantage of enabling both Success and Failure? ANSWER Answers will vary. However, a primary disadvantage is that the Security log would record every instance of a user successfully exercising a user right, resulting in large log files that can quickly become unmanageable.
22. Switch to the first instance of Event Viewer, right-click the Security node, and then click Refresh.
QUESTION What event indicates a failed attempt to access the Security log? ANSWER A Failure Audit type of event appears with an Event ID of 578.
135
7. Switch to Event Viewer, right-click the Security log, and then select Refresh.
QUESTION Why is there no record of the failed logon attempt? ANSWER Audit Account Logon events are generated when a domain account is authenticated on a domain controller, or when a local account is authenticated on a local workstation. Because the failed logon attempt occurred on a workstation using a domain account, no record of the failed logon attempt is recorded in the Security log of the local workstation.
11. Switch to Event Viewer, right-click the Security log, and then select Refresh.
QUESTION Is there a record in the Security log that indicates a failed logon attempt? ANSWER Yes. There is a Failure Audit event with an Event ID of 529, indicating a failed logon attempt.
136
12. In the Internet Explorer browser window, right-click SACL-Test, select Properties, select Security, and then click Advanced
QUESTION What is the difference between the Advanced Security Settings For SACL-Test page you see when you are logged on as an administrative account vs. the page you see when you are logged on as a user account? ANSWER The Auditing tab is visible to the administrative account, but it is not visible to a user account.
137
9. In the Local Security Settings console, browse to Audit Policy, right-click Audit Object Access, select Help, and then read the description.
QUESTION When you define success or failure settings on Audit Object Access, what kind of access is audited? ANSWER When you enable Audit Object Access, you can audit access to any object that has a System Access Control List. These objects include files, folders, printers, and registry keys.
18. Right-click the Security log, select Refresh, and then examine the audit entries in the details pane.
QUESTION How many failure audit events do you see in the Security log that are related to the action of attempting to delete the file? ANSWER You should see as many as eight failure audit events.
19. Double-click the topmost failure audit event related to the attempt to delete the AuditTest file, and then read the description of the audit entry.
QUESTION What is listed in the Accesses field of the description of the failed audit event? ANSWER The Accesses field should list DELETE.
138
20. On the Event Properties page, click the down arrow to examine the descriptions of the audit failures related to the attempted deletion of the file. Pay attention to the Accesses field in each entry. Click Cancel on the Event Properties page when you reach the end of the Failure Audit events.
QUESTION What three kinds of access are listed in the Accesses field for all the entries related to the failed attempt to delete the file? ANSWER The Accesses field records the following kinds of access: DELETE, ReadAttributes, and READ_CONTROL.
23. In Event Viewer, select the Category column to sort the entries by category, locate the first entry that displays Object Access in the Category column, and then scroll down to the final entry that displays Object Access in the Category column.
QUESTION What potential problems for audit log analysis and system resources are indicated by the number of Success Audit entries? ANSWER Since this represents the access of one user, there are too many entries to analyze. Also, based on the number of entries, this means that in a production environment, the Security log would become very large in a short period of time.
139
QUESTION If the SACL-Test folder contained highly sensitive information, would the current audit settings be sufficient? ANSWER Answers will vary, but at the very least you would probably also want to audit for attempts to read and modify the file. However, it is important to keep in mind that excessive auditing will consume system resources and make log files difficult to manage and analyze.
140
5. In the log file, locate the group of entries that display the IP address of 10.12.209.34 in the C-IP field (the left-most entry on each of the lines), and answer the following questions.
QUESTION What kinds of files do the requests attempt to invoke? ANSWER All the requests attempt to invoke executable files, either Root.exe or Cmd.exe. QUESTION What features of these requests lead you to believe that they represent an attempt to compromise a Web server? ANSWER The requests appear to be following a systematic pattern. For example, they all make requests to invoke an executable file. Furthermore, multiple requests are made to locate the executable file in likely directories, such as C:\Winnt\System32 and D:\Winnt\System32. All of the requests attempt to execute files that are outside of the virtual directories used by the Web site but are on the local hard drive. The requests also target directories that are likely to allow the running of executable files, such as the \Scripts virtual directory. QUESTION A directory traversal attack attempts to invoke executable files that are found on the local hard drive outside of the virtual directories used by the Web site. Does this group of requests represent an attempted directory traversal attack? ANSWER Yes. The \Winnt and \Winnt\System32 directories should never be included in a Web sites virtual directories. QUESTION Was the attempt to compromise the server successful? Hint: an HTTP status code of 200 indicates a successful request. ANSWER No. An HTTP status code of 502 is recorded for all the requests, and no subsequent traffic is generated as a result.
141
6. In the log file, locate the group of entries that displays the internal IP address of 192.168.100.222 in the C-IP field (the left-most entry on each of the lines), and answer the following questions.
QUESTION Based on the scenario that begins this lab exercise, what features of these requests might cause you to believe that an internal computer might have been compromised? Hint: look at the times the requests are being made. ANSWER Requests for an external Web site named Example2.net occur at regular five-hour intervals. Some computers have been left on during the weekend, and the one employee who came in to the office did not access the Internet. The traffic originating from the computer at 192.168.100.222 likely represents an automated request, which at this point cant be explained by applications normally running on workstations and servers. QUESTION Were the requests from the internal computer to the Example2.net Web site successful? ANSWER Yes. A status code of 200 indicates a successful request. QUESTION What information in the log file can you use to do research on the Internet to determine whether the internal computer has in fact been compromised? ANSWER The c-agent field contains the legitimate-sounding name Autoproxy/0.2-test16. If these entries represent requests made by an internal computer compromised by a Trojan horse program or a worm, a search on the name should result in positive hits on security-related Web sites, assuming that the Trojan horse has been known for some time and has been reported.
142
8. Type route print > C:\Lab Manual\Lab 13\Labwork\ RoutingTable.txt and then press ENTER.
QUESTION In steps 58, you collected information on the TCP/IP configuration of the target computer. Why is it a good idea to collect this information? ANSWER It is a good idea to collect information on the TCP/IP configuration for two reasons: This information should be considered baseline information and is needed for comprehensiveness. You need to determine if the TCP/IP configuration has been modified as a result of a successful attack.
143
14. Type arp -a C:\Lab Manual\Lab 13\Labwork\ArpCache.txt and then press ENTER.
QUESTION In steps 911, you examined volatile data related to name resolution and IPtomedia access control (MAC) address resolution. What is the purpose of recording this kind of evidence? ANSWER The Domain Name System (DNS) and the NetBIOS name resolution caches might show the DNS and NetBIOS names of computers that the attacker caused the suspect computer to connect to, either to launch a new attack or to transfer data. Likewise, the Address Resolution Protocol (ARP) cache might show IP addresses on the local subnet that the attacker caused the suspect computer to communicate with. In any event, the DNS, NetBIOS, and ARP caches will show evidence of recent communication activity.
18. Type tasklist C:\Lab Manual\Lab 13\Labwork\Tasklist.txt and then press ENTER.
QUESTION Why is it a good idea to collect data on the tasks and the services currently running on the suspect computer? ANSWER If the attacker left a program running on the suspect computer, it might be identifiable through the task list. Also, a number of well-known attacks use services that are disabled by default, such as Trivial File Transfer Protocol (TFTP). By viewing the services, you might be able to determine whether any services are running on the suspect computer that shouldnt be.
Using Windows Resource Kit and Support Kit Tools to Collect Evidence
3. Type c:\lab manual\lab 13\labwork\memsnap.log (with the quotation marks), press ENTER, and then review the information displayed in Notepad.
QUESTION Both Tasklist.exe and Memsnap.exe display information on running tasks. What advantages does Memsnap.exe have over Tasklist.exe? ANSWER Answers will vary. Memsnap.exe displays more detailed information on processes running in memory. The output of Memsnap.exe also includes information on the date and time, operating system build number, and computer name.
144
6. Type srvinfo -d \\computeryy (where yy is the two-digit version of your lab partners student number), press ENTER, and then review the contents of the screen output.
QUESTION The output of the command issued against the local computer and the remote computer differs slightly: the command issued against the local computer shows detailed information related to the network interface adapter and installed protocols. What might account for this difference? Hint: the reason has nothing to do with the fact that one command is issued against a local computer and the other against a remote computer. ANSWER In order to see the additional information, you must use an account that has administrative permissions on the target computer. Your Adminx account does not have administrative permissions on your lab partners computer.
7. Type srvinfo -d > C:\Lab Manual\Lab 13\Labwork\Srvinfo.txt and then press ENTER.
QUESTION Both the Net Start and the Srvinfo.exe commands display information on running services. What advantages does the Srvinfo.exe command have over the Net Start command? ANSWER Answers will vary. The output of the Srvinfo.exe command displays more information than the output of the Net Start.exe command. It can display information on all the installed services whether they are running or not, it displays information about the service drivers, and it displays information about the computer against which the command is run.
8. Type srvcheck \\computerxx (where xx is the two-digit version of your student number), press ENTER, and then review the contents of the screen output.
QUESTION The Srvcheck.exe command enumerates shares and share permissions on local and remote computers. It can be useful to determine, for example, if an attacker has modified share permissions or created new shares. However, Srvcheck.exe does not display all shares on the computer. What shares does it not display? ANSWER It does not display hidden shares. Hidden shares are created by using a $ character at the end of the share name.
145
11. Type dumpel /?, press ENTER, and then note the capabilities of the command.
QUESTION Can you use the command to filter events that occurred within the past 24 hours and pass them to a text file? If so, why would you want to perform this kind of filtering when investigating an incident? ANSWER Yes, you can filter Event logs by a number of criteria, including the event number and time of days. Event logs can grow quite large. If you were creating a record of events, and writing them to a floppy disk, you would want to collect information that could fit on the floppy disk media. You would also want to scope the information to only entries that were relevant to your investigation.
13. Type security.log, examine the contents of the file containing the audit events, and then close Notepad.
QUESTION The results generated by the command-line utilities could also be generated using GUI-based tools found in Windows operating systems. For example, you could use Event Viewer on one computer to connect to the logs on a remote computer and then export those logs to another computer. Why might you use a command-line tool instead of a GUI-based tool? ANSWER Answers will vary. A primary goal in conducting an initial investigation is to leave as light a footprint as possible while collecting relevant information. Command-line tools occupy very little space in memory, as opposed to the GUI-based tools. Command-line tools run quickly and require relatively few resources of the computer on which they run. Furthermore, they are convenient because they are small enough that many of them can fit collectively on a single floppy disk that can be used as a utility disk for the purpose of responding to incidents. They will also work with the Run As command if administrative permissions are required.
146
2. Every day, an automated process exports log files from computers on your network and places them in a central location. What special considerations should you give to the locations where the log files are stored?
ANSWER Log files should always be protected from unauthorized access. Because altering log files is a way for attackers to cover their tracks and because log files might contain importation information pertaining to attacks and attempted attacks, it is important to make log files as secure as possible. Securing log files includes not only protecting them with file access permissions but also making backup copies of the logs and storing these backups in secure locations.
3. Why is it a good idea to audit successful and failed attempts to read the Security audit log?
ANSWER Access to the Security logs should be strictly controlled. Any activity that indicates failed attempts (or successful attempts that occur at odd times or with unusual accounts) to read the Security log should be treated as suspicious.
4. In reviewing your audit logs, you notice a number of account lockout events (Event ID 539). However, the users whose accounts have been locked out have not made requests to the Help Desk to have the lockout removed. Why havent the users contacted the Help Desk, and what other information should you be paying attention to in analyzing the account lockout audit entries?
ANSWER The most likely reason that users have not contacted the Help Desk is that the account lockout duration is set for a relatively short period of time and that the failed logon attempts are occurring during off hours when the employees are not at work. By the time the employees arrive at work, the lockout period has expired and they are able to log on normally. You should pay attention to the times that the failed logon events and account lockout events occur.
5. Why is it often advisable to selectively limit the audit information that is generated for successful or failed attempts to access a file or folder?
ANSWER Too much information can be as problematic as too little information. If you audit for every possible kind of file and folder access, you generate a large number of events for every access to the file or folder for which you have turned on auditing. When you generate too much information, it can be difficult to separate relevant, important information from trivial and inconsequential information. Furthermore, generating auditing events consumes systems resources (such as memory and disk space). A busy server on which the auditing of files and folders has been enabled indiscriminately would require significant disk space to store the Security
147
logs. You would also run into issues with having to archive the logs on a frequent basis to avoid overwriting potential security violations.
6. You are responsible for making the initial response to a computer security incident. In addition to executing commands to record system information stored in volatile memory, what other activities should you perform to ensure the potential admissibility of evidence you collect in a court of law?
ANSWER Answers will vary. At the very least, you should be keeping a detailed journal of the activities you perform. A bound notebook is the best place to record entries, because this makes it possible to determine if pages have been removed. The entries should include information on the specific actions you perform, the times that you performed the actions, the people you contacted, and so on. Handwritten entries that are signed and dated are best, even if you are using a standard form for recording the details of the incident response. Other activities that could be performed include photographing the computer monitor, the computer, the cables attached to the computer, and the immediate surroundings, as well as labeling and sealing evidence in bags and containers if components are disassembled. It is important that a verifiable chain of custody be established for all the evidence. This means that all evidence must be labeled with information regarding who collected the evidence, the time of collection, and other relevant information. The chain of custody establishes that evidence is trustworthy by providing a history that shows who handled the evidence and how the evidence was collected, stored, transported, and analyzed.
7. You are responding to a computer security incident involving an employee who was abruptly asked to report to Human Resources after i twas discovered she was using her computer in violation of company policies. You have been asked to collect evidence from the computer. When you arrive at the users workstation, you discover that the employees manager powered off the computer and then restarted it in order to log in with his own credentials to discover more details of the employees activities. How has the manager potentially jeopardized the evidence available on the computer and increased the risk for the company?
ANSWER Answers will vary. First, when the computer was powered off and then restarted, any incriminating evidence stored in volatile memory was irrevocably lost. Second, by restarting the computer, the manager exposed the computer to the potential for running commands that could destroy incriminating data (for example, through the RunOnce registry key). Because the data that you can now collect from the computer has been tainted by the managers actions, the company might not have a sufficiently strong legal basis to support its claims against the employee in either a civil or criminal court.
148
8. You are responding to a security incident involving an employees computer after it was discovered that the employee was using his computer for activities prohibited by company policies. You have recorded information stored in volatile memory. Based on your initial investigation, it is likely the employee will be terminated. Before you shut down the employees computer, what additional actions should you take?
ANSWER Answers will vary. If an employees actions have the potential to involve the company in civil or criminal court proceedings, you should take a bit-level image of the hard drive of the employees computer before shutting it down. A backup of the files on the employees computer is probably insufficient because the backup will contain only the information stored in allocated sectors of the hard drive and will miss recoverable information stored in deallocated sectors. Furthermore, it is important to use imaging software that faithfully copies information from unallocated and deallocated hard drive sectors. Commercial disk imaging software might not have this capability, so you should use special forensic disk imaging software.
9. You are the network administrator for Contoso Pharmaceuticals. While performing a daily review of Web Proxy logs on your ISA Server, you notice a suspicious entry that indicates the presence of a Trojan horse program on an internal computer. How should you respond to this incident? To answer this question, select the possible responses from the following list, and put them in the correct order. a. Disconnect the computer from the network. b. Call the CSIRT. c. Power off the computer. d. Start a written journal of your actions. e. Continue reading the log files. f. Consult the companys Incident Response Procedure Guidelines.
ANSWER f, d, e, and b. You should first consult the Incident Response Procedure Guidelines (f). It is important to follow correct procedures. Then, you should start a written journal detailing your actions (d). If the suspected compromise turns out to be real and if civil or criminal action is a possibility, a written journal helps to establish the admissibility of evidence you gather.
149
You should then either continue to read the log files, looking for additional evidence (e), or contact the CSIRT (b). These last two steps can be transposed but need to be performed immediately after starting a written journal of the incident. You might also need to disconnect the computer from the network or power it off. However, you should keep in mind that disconnecting the computer from the network or powering it off risks the loss of evidence; for example, losing Transmission Control Protocol (TCP) connections to remote hosts. The actions you take at this time depend on whether you and the CSIRT determine if the threat is real and the nature of that threat. Ultimately, though, the decision to disconnect the computer or power it off should come from the CSIRT, unless it is an emergency calling for independent action and good judgment on your part.
LAB CHALLENGE 13-1: CONFIGURING AUDIT POLICIES FOR HIGH SECURITY SERVERS AND WORKSTATIONS
You are a network administrator for Contoso Pharmaceuticals. Among your many duties, you are responsible for monitoring a group of servers used by researchers at the company. Much of the data stored on the servers is highly sensitive. You and your manager have been reviewing the audit settings on this group of computers. You have come to the conclusion that, given the sensitive nature of the data, you need to do extensive auditing on these computers to detect any attempts to compromise the computers or the files they contain. Your manager wants you to audit for the following kinds of activity: Any activity related to logging on and off from the workstations using both domain and local accounts Any attempts to modify and delete files or registry settings Use of printers connected to workstations Any attempt to add or modify user or group objects on the local computers Any attempt to modify user rights or audit policies Any attempt by users to exercise user rights Any attempt to shut down or restart computers Because of the critical nature of the data and the importance of the Security logs on these computers, your manager wants you to provide the following configuration for Security logs: Older events in the Security log should never be overwritten by newer events. If the Security log fills up, the computers should shut down automatically.
150
Ensure that the computer does not shut down prematurely as a result of logging many entries to the Security log. Ideally, the maximum size of the log file should be at least twice the default size for the log file. To complete this lab challenge, create a new group policy object named Audit Policies on your Employeesx organizational unit (where x is your student number). Configure the policy settings, take the appropriate screen shots of the policy settings (you will need more than one screen shot), and save the screen shots as C:\Lab Manual\Lab 13\Labwork\LC13-1-x_LastName.bmp (where x is a sequential number starting with 1 representing each of your screen shots and LastName is your last name). Your instructor might want you to submit your screen shots for evaluation. If so, you will be given specific instructions for submitting your screen shots.
ANSWER To successfully complete this lab challenge, you need to create three screen shots showing the appropriate settings. One screen shot shows the Audit Policy settings, a second screen shot shows a single Security Options setting, and a third screen shot shows the Event log settings. The appropriate settings for each of the three group policy objects are listed below. The following Audit Policy settings should be defined in the group policy: Success and failure should be audited for all events, with the exception of Audit Directory Service Access and Audit Process Tracking. For these two events, the policy should be set as Not Defined. A sample answer screen shot is shown below.
151
G13XX06
The following setting should be enabled under the Security Options group policy object: Audit: Shut Down System Immediately If Unable To Log Security Audits.
G13XX07
The following settings should be defined on the Event Log group policy object: Maximum Security Log Size > 32,000 KBs and Retention Method For Security Log = Manually.
G13XX08
152
TROUBLESHOOTING LAB B:
153
The CSIRT team has put you in charge of investigating whether a security breach has occurred. At 9:00 A.M., you begin your investigation by interviewing Max Benson, who provides you with the following information: Late yesterday, a Web server named CPSRV006 had to be rebuilt. This server is used as a Web server for business-to-business (B2B) transactions. Max notes that Amy Rusko, who is a member of his team and is responsible for performing security audits and applying patches, had to leave work suddenly this morning to deal with a family emergency. She was supposed to ensure that the rebuilt server passed a Microsoft Baseline Security Analyzer (MBSA) audit. Max has just received an e-mail from Amy regarding the MBSA audit she performed just before she had to leave the office. The e-mail contained the most recent change log for CPSRV006, which also showed the results of the MBSA audit. Because Max had to provide an initial response to Dr. Lees incident report this morning, he hasnt had time to read the e-mail or look at the change log. Max reports that he might have lost an old network diagram of the Contoso head office. A couple of days ago, he was working on a new network diagram. He placed the old network diagram among the papers stacked on his desk. When it occurred to him to shred the old diagram, he couldnt find it. At the time, he assumed he had just misplaced it and that it would turn up eventually. But now he wonders whether he threw it out or if someone took it from his desk. Given the events of this morning, he is quite concerned that he doesnt know what happened to the network diagram. Because of this initial information from Max, you decide to widen your investigation to include the recently rebuilt Web server (CPSRV006) in addition to the Internet Acceleration and Security (ISA) Server firewall, the domain controller, and the server where the files disappeared.
PART 3: TROUBLESHOOTING
This lab requires you to analyze a number of log files to determine the cause and extent of the attack that occurred against the Contoso network and computer systems. After analyzing the log files, you will formulate an appropriate response to the attack and answer a series of questions related to the lab. You will record your findings and respond to the lab questions in a file named Troubleshooting Lab B Worksheet.doc, which is found in the C:\Lab Manual\TroubleshootingLabB folder.
154
Depending on your instructor, this lab can be performed individually, in small groups, or as the basis for a classroom discussion. To view the log files for this lab, open Windows Explorer and browse to C:\Lab Manual\TroubleshootingLabB. You will see a number of folders that contain log files relating to the incident described in the scenario above. The names and descriptions of the log files are listed in Table B-1.
Table B-1 Log File Content Matrix Log Filename Content
Manually maintained change log MBSA log for CPSRV006 Security log for CPSRV006 Security log for DC-CHI-01 Security log for RDFL004 ISA Server log Netstat log File integrity checker log for RDFL004
In the C:\Lab Manual\TroubleshootingLabB folder, you will also find a number of other files to help you complete the lab. These files are listed in Table B-2.
Table B-2 Supporting Files Filename Content
Contoso Network Diagram.gif How Assets Are Attacked.doc Security Log Review Procedure.doc Things To Look For In Log Files.doc Troubleshooting Lab B Worksheet
Contoso network diagram A summary of exploits that can be used against computer systems A document that explains Contosos official procedures for reviewing log files A document that provides information on useful strategies for analyzing log files A worksheet containing forms and questions that you complete as part of this lab
To complete this lab, use WordPad to open the file named Troubleshooting Lab B Worksheet.doc. (Because you will need to make entries in a Microsoft Word table, a better alternative is to use Word if it is available. Your instructor can tell you if either application is available.) Troubleshooting Lab B Worksheet.doc consists of four parts, with the first three parts representing typical kinds of documentation you would create when responding to a computer security incident.
155
The first part consists of a table representing journal entries you would make while investigating and responding to an incident. The second part is a table that you complete to show a summary of the log entries that are relevant to the incident. The purpose of this table is to provide a kind of index to the entries in the log files and to show the relationship between events in different log files by grouping the related events together. The third part is an incident response form that you fill in once you have investigated and responded to the incident. To complete this form, you will need to formulate a hypothetical response to the scenario incident. Because this is a scenario-based exercise, you might not be able to fill in all the fields in the form. However, you should provide as much accurate detail as you can, according to the scenario. For example, the form should accurately list the type of attack and the classification of data involved. The fourth part consists of a series of questions that you answer after completing your investigation. Please answer the questions in the worksheet itself. The questions in the worksheet are listed in Part 4, Troubleshooting Lab B Questions, to provide you with some additional guidance in completing this lab. In fact, you might want to consider the questions as you examine the logs, because the questions might help you in your analysis. When you have completed the worksheet, save it as C:\Lab Manual\ TroubleshootingLabB\Labwork\TBLB_YourLastName.doc. If your instructor wants you to submit this worksheet for evaluation, he or she will explain how to do so. Documentation is crucial. You will be evaluated not only on your ability to correctly identify the problems that were introduced and their solutions, but also on the process you used to identify the problems and the solutions.
156
3. According to the Security log file for CPSRV006, what executable files were run by the attacker? Hint: search the file for the .exe text string.
ANSWER Excluding .dll files, the files are Inetinfo.exe, Cmd.exe, Nc.exe, Net.exe, and Ftp.exe.
4. According to the Security log file for CPSRV006, what two text files were created by the attacker? Hint: search the file for the .txt text string.
ANSWER The attacker created two text files: Clist.txt and Ipconfig.txt.
5. What protocol did the attacker use to transfer files? What log files show evidence of the protocol that was used? Hint: knowing the Transmission Control Protocol (TCP) ports for common protocols will help you answer this question.
ANSWER The attacker used FTP to transfer the files. You can see the evidence of FTP use in the CPSRV006 Security log, the CPSRV006 Netstat log, and the ISA Server log. FTP uses TCP ports 20 and 21.
6. According to the tripwire log for RDFL004, what files were modified or added?
ANSWER The attacker modified Explorer.exe and Taskman.exe. The attacker then added files named Server.exe and Subseven2.2b.zip.
7. According to the Security log file for RDFL004, what executable files did the attacker run?
ANSWER The attacker launched Pkzip.exe and Server.exe.
157
8. Considering your response to question 7, are there entries in other log files that correspond to the running of one of these executable files?
ANSWER Yes. The ISA Server log shows outbound traffic destined for a remote host using TCP port 27374 at the same time. The Netstat log for CPSRV006 also shows that this port is in an established state with a remote host. Port 27374 is associated with a number of well-known Trojan horses, including SubSeven, BadBlood, Ramen, and others.
10. What format is used to generate user names at Contoso pharmaceuticals? That is, how is a persons name used to create a user name? Are user names easy to guess?
ANSWER The user name is a combination of the first name and one or two initials of the last name. Yes, user names are easy to guess.
12. What should Contosos responses be to the intrusion? For example, should they power off the servers, contact other individuals, or discipline employees?
ANSWER At the very least, they should disconnect RDFL004 and CPSRV006 from the network, because these servers are compromised. Next, they might want to consider contacting law enforcement agencies and consider hiring a forensics specialist to ensure the proper collection of evidence. Once evidence has been collected, the hard drives of the computers should be wiped and a new instance of the operating system and applications installed. According to the change logs, an employee named Pat Coleman rebuilt the server and put it online without applying patches. At the very least, a supervisor needs to talk to Pat about the dangers of putting a server into production before it has had up-to-date and approved patches applied to it. RDFL004 might also have
158
lacked patches, and this issue needs to be addressed. Max Benson might have to answer for his carelessness with the network diagram. Also, network passwords should be changed, users need to be educated about the need for complex passwords, and password complexity should be enforced through group policy.
13. What should Contoso do to enhance security and prevent similar attacks from taking place in the future?
ANSWER They should strengthen their policies and procedures with regard to security audits and patches. They should not allow multihomed configurations to be implemented on computers in the DMZ. They should implement strict rules on the internal firewall to control communication between internal hosts and hosts in the DMZ. They should enforce password complexity requirements using group policy. For high security servers, they might want to consider implementing the Internet Protocol Security (IPSec) Require Security policy, which would have prevented the attack on RDFL004 entirely. Also, a number of security-related procedures probably werent properly followed. Procedure and policy documents should be reviewed. Training and education will help address any gaps between the procedure and policy documents and the behavior of end users and computer support staff. In general, the organization needs to practice defense-in-depth as much as possible to mitigate risk. Defense-in-depth means that a layered approach is used to provide security and that defense against a particular threat or set of threats does not rely on a single countermeasure. For example, a firewall might have the capability to drop HTTP packets that attempt to exploit a buffer overflow vulnerability. However, the Web servers behind the firewall should also be patched to ensure that the risk of a buffer overflow attack is mitigated. Patching servers implies that processes and procedures are put in place to ensure that critical patches are applied in a timely and consistent manner. This means that administrators need to be well acquainted with those policies and procedures and to be knowledgeable about security and the technology they deal with. Having knowledgeable network administrators implies that the company provides adequate training and also follows sound hiring practices to ensure (as much as possible) that new employees have appropriate knowledge and are trustworthy. In other words, for a defense-in-depth security strategy to be effective, it must focus on technology, operations, and people. Weakness in any one of these areas could have serious consequences.
159
To sum up, the organization needs to ensure that it has Appropriate technological countermeasures (such as firewalls, intrusion detection systems, and virus checkers) Good corporate security policies, procedures, and guidelines that are fully supported by all levels of management and communicated effectively and appropriately to all staff Well-informed and security-conscious users as well as knowledgeable and well-trained network administrators NOTE Please see the Lab Notes on the Instructor CD for a detailed analysis of the log files and suggestions for evaluating the exercise.