SlideShare a Scribd company logo
Hardening Windows 2003 Web Servers
Agenda Physical Security OS Installation Account Policies Local Policies Services User Accounts IP Policies Permissions Hardening IIS Additional Hardening
General
General Who should take this course System Consultants Security Consultants System Architects Anyone who is responsible for the configuration and/or the administration of a Windows 2003 environment
General Strategy: Creating a secure environment Secure current and/or new implementations of the Windows 2003 operating system
General Strategy: Maintaining a secure environment Maintain a secure environment by staying on top of security issues that are relevant to your installation This is a proactive process!!
General Scope of this course This course will focus on the secure configuration of a Windows 2003 server hosting Internet Information Services (IIS) version 6.0
General Prerequisites Experience with IT security Experience with MMC Experience deploying web applications in enterprise environments Some web application development knowledge will be useful but is not mandatory
General What happens if I don’t harden my web server? Most systems can be compromised within 72 hours Corporate humilliation Won’t know if your system is has been/is being attacked Money wasted on reparation and down time Company data/ secrets could be stolen Some web sites are fed with data that comes from the same database as other internal systems
Hardening one step at a time Physical Security --------------------------------------- OS Installation ----------------------------------------- Account Policies ---------------------------------------- Local Policies ------------------------------------------- Services ------------------------------------------------ User Accounts ----------------------------------------- IP Policies------------- --------------------------------- Permissions -------------------------------------------- Hardening IIS ------------------------------------------ Additional Hardening ---------------------------------- Number of Weaknesses
Prerequisites What should Install  ALL  necessary software/ services before you begin. Make sure that they ALL work. Why? If software/ service dosn’t work: Because of the hardening? Did it work before we started? These are time wasting situations Let’s begin.
Physical Security
Physical Security We assume that physical security is in place.
OS Installation
OS Installation No system upgrades  Why? Too many grey areas ONLY  clean installations Two partitions (we shall be using one) 01    system files 02    web applications Strong administrative passwords Rainbow attacks make 8 character passwords trivial to break Only install necessary components
OS Installation Use a static IP instead of DHCP if possible (one less service) If there are multiple servers in the DMZ, consider making a DMZ domain from which critical servers will inherit their baseline GPOs.
Proof of concept scan
Proof of concept scan Windows 2003 v. Windows 2000 Why bother using windows 2003? More secure by default. Can Windows 2000 be as secure? Yes. It requires work.
Proof of concept scan Windows 2003 v. Windows 2000 We will use standard tools to inspect a default Windows 2003 installation. Tools to use: Nmap. Scans to perform: Nmap –sS –P0 –O –p1-65535  Nmap –sS –P0 –O –g 53 –p 1-65535 Nmap –sT –P0 –O –p1-65535 NStealth Windows 2003: xx.xx.xx.xx
Local Security Settings
Policies Local Security Settings
Policies Account Policies Never use dictionary words. Never reuse old passwords by altering only one digit. Never choose passwords based on pets, habits, likes or dislikes. One must never be able to identify a password by looking at the things on your desk. Use upper- and lowercase with symbols and numbers. Choose passwords based on phrases: Th15 comput€r i5 prot€cted by a str0ng p@ssword
Policies Account Policies: password Policy Enforce Password History: 24 Maximum Password Age: 42 days Minimum Password Age: 2 days Minimum Password Length: 14 Complexity requirements: Enabled Use Reversible Encryption: Disabled
Policies Account Policies: Account Lockout Policy Account Lockout Duration: 15 Minutes Account Lockout Threshold: 10 invalid attempts Reset Lockout Counter: 15 Minutes
Services
Services What services does a web-server need? Are you sure they are needed? YES: secure them NO: remove them This is the hardest to get right
Or…
System Settings Isn’t there a quicker way to change system settings? Yes. Meet the ” Security Analysis and Configuration”  snap-in
System Settings Security Analysis and Configuration Run mmc File    Add/Remove Snap-in Add    Security Configuration and Analysis    Add Right Click on Security Analysis and Configuration    Open Database Choose a File Name    Open Navigate to ”High Security Baseline.inf”    Open Right Click on Security Analysis and Configuration    Analyse Computer Now… Save the log to your desktop
User Accounts
User Accounts Securing Well known User Accounts Rename all built-in accounts: Administrator  Guest Why? Everyone knows the names of these two Windows accounts.  50% of a brute force attack is already common knowledge. The descriptions should also be altered.
User Accounts Securing Well known User Accounts Assign strong passwords to these accounts Th15 1s @ v€ry st0ng p@s5word don’t y0u th1nk? Disable default guest accounts (if not already done by default)
IP Policies
IP Policies Structure IP Filter advice: give your rules good names. Examples might look like this: <POLICY>  <DIRECTION>  <SERVICE> Permit  INBOUND  HTTP(S) Permit  OUTBOUND  SSH Permit OUTBOUND DNS Permit OUTBOUND HTTP(S) Deny  BIDIRECTIONAL  ALL
IP Policies Example scenario A web server might look similar to this: Permit INBOUND: HTTP HTTPS? TS? Permit OUTBOUND: HTTP HTTPS DNS
IP Policies Local Security Settings
IP Policies Lets get started Create IP Security Policy… Name: Secure Web Uncheck “Activate the default response rule” Check “Edit Properties” Uncheck “Use Add Wizard”
IP Policies Basic rules Create 4 rules Deny  BIDIRECTIONAL  ALL Permit  INBOUND  HTTP(S) Permit  OUTBOUND  HTTP(S) Permit  OUTBOUND  DNS When you’re done, assign your new policy
IP Policies Lets look at the results Tools needed: NMap Exercise Groups of two or three Choose which computer will perform the scan Un-assign IP Policies as they also block outboud traffic Perform the following port scans: Nmap –sS –P0 –O –p1-65535  Nmap –sS –P0 –O –g 53 –p 1-65535 Nmap –sT –P0 –O –p1-65535
File Permissions
Permissions Assigning correct NTFS permissions CGI files: .EXE, .DLL, .CMD, .PL Administrators: Full Control System: Full Control IUSR_SERVER: Read & Execute, Read Script Files: .ASPX, .ASP, .PHP Administrators: Full Control System: Full Control IUSR_SERVER: Read & Execute, Read Include Files: .INC, .SHTML, .SHTM Administrators: Full Control System: Full Control IUSR_SERVER: Read & Execute, Read
Permissions Assigning correct NTFS permissions Static Files: .HTML, .HTM, .TXT, .GIF, .JPG Administrators: Full Control System: Full Control IUSR_SERVER: Read Data Files: .MDB Administrators: Full Control System: Full Control IUSR_SERVER: Read, Write, Read & Execute, Modify
Hardening IIS
Hardening IIS Web server extensions Application Debugging Custom Errors HTTP Verbs URL Scan Logging
Web server Extensions Predefined Web Service Extensions Everything is turned  off  by default A default IIS 6.0 installation will only run sites with static pages, .HTML, .HTM.
Web server Extensions Predefined Web Service Extensions (cont.) Active Server Pages ASP.NET version 1.1.4322 FrontPage Server Extensions 2002 Internet Data Connector Server-Side Includes WebDAV
Application Debugging Stop IIS from sending error messages to clients Stop applications from sending debugging details to clients: Right click on your web site in the IIS manager Home Directory    Configuration App Debugging Check ”Send text error to client” and leave the box blank
Custom Errors Redirect to a custom error page when error occur Send custom error pages to clients for HTTP 500’s, 404’s: Right click on your web site in the IIS manager Custom Errors    double click on 500 Message Type: URL URL: /<LOCATION OF CUSTOM PAGE> Make certain that error 500 messages don’t get sent to the browser!
HTTP Verbs Limit access to HTTP Verbs Remove all un-needed HTTP verbs from each application: Generally required: GET, HEAD, POST
URL Scan Url filtering What is URL Scan? What can it do? Enable/disable HTTP verbs Disable HTTP headers Enable/disable specific file extensions Disable character sequences Remove/alter the server header Restrict header lengths Questions concerning URL Scan?
URL Scan Url filtering How does it work:  Configuration  File Installation Fine tuning
Logging Configuring Logging Create seperate logs for each site Log Folder Permissions Administrators: Full Control System: Full Control IUSR_SERVER: Read, Write, Modify, List Folder Contents, Read &  Execute
Additional Hardening
Additional Hardening Uninstallable Components Special Binaries
Uninstallable Components Load “%systemroot%\inf\ sysoc.inf” into notepad Replace ”hide” with ”” Run Add/Remove Applications Remove any unwanted/ unneeded components (be careful!)
Special Binaries Several executables exist on a standard Windows 2000 installation that could become rather useful to an attacker Special access rights need to be set on all of these executables
Special Binaries (cont.) Uncheck ”Allow inheritable permissions from parent to propagate this object”. Remove all users from the name list, including SYSTEM. Assign ”Full Control” to a user that is to be used to access these files – an administrator.
Special Binaries (cont.) rsh.exe, secfixup.exe, telnet.exe, tftp.exe, ipconfig.exe, nbtstat.exe, netstat.exe, ping.exe, qbasic.exe, rdisk.exe, regdit32.exe, net.exe, nslookup.exe, posix.exe,  rcp.exe, regedit.exe, rexec.exe, tracert.exe, command.com, regedit.exe, os2.exe, os2ss.exe, arp.exe, at.exe, atsvc.exe, cacls.exe, cmd.exe, debug.exe, edit.com, edlin.exe, finger.exe, ftp.exe, xcopy.exe, os2srv.exe, cscript.exe, wscript.exe, iisreset.exe, route.exe, runonce.exe, syskey.exe
What have we learned today? Physical Security OS Installation Account Policies Local Policies Services User Accounts IP Policies- Permissions Hardening IIS Additional Hardening
?

More Related Content

PDF
Windows File Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
PPTX
What's New in AlienVault v3.0?
PPTX
Some dirty, quick and well-known tricks to hack your bad .NET WebApps
PDF
Windows logging cheat sheet
PDF
Oracle security 08-oracle network security
DOCX
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
PDF
Oracle security 02-administering user security
PDF
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
Windows File Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology
What's New in AlienVault v3.0?
Some dirty, quick and well-known tricks to hack your bad .NET WebApps
Windows logging cheat sheet
Oracle security 08-oracle network security
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Oracle security 02-administering user security
Windows Registry Auditing Cheat Sheet ver Oct 2016 - MalwareArchaeology

What's hot (20)

PDF
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
PDF
Apache Web Server
PPTX
Securing Hadoop with OSSEC
PPTX
Continuous monitoring with OSSIM
PPTX
Whats New in OSSIM v2.2?
PPTX
Sql server security in an insecure world
PDF
WordPress Security WordCamp OC 2013
PDF
Alien vault _policymanagement
PPTX
How to Secure your WordPress Website - WordCamp UK 2014
PPTX
A2 - broken authentication and session management(OWASP thailand chapter Apri...
PDF
Info sec is not daunting v1.0
PPT
Software Management Iltce2007b
PPT
Securing Your WordPress Website - WordCamp GC 2011
PPTX
Best Practices for Configuring Your OSSIM Installation
PDF
Windows logging workshop - BSides Austin 2014
PDF
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
PDF
Ask a Malware Archaeologist
PPTX
Locking down word press
PPTX
Protect Your WordPress From The Inside Out
Windows splunk logging cheat sheet Oct 2016 - MalwareArchaeology.com
Apache Web Server
Securing Hadoop with OSSEC
Continuous monitoring with OSSIM
Whats New in OSSIM v2.2?
Sql server security in an insecure world
WordPress Security WordCamp OC 2013
Alien vault _policymanagement
How to Secure your WordPress Website - WordCamp UK 2014
A2 - broken authentication and session management(OWASP thailand chapter Apri...
Info sec is not daunting v1.0
Software Management Iltce2007b
Securing Your WordPress Website - WordCamp GC 2011
Best Practices for Configuring Your OSSIM Installation
Windows logging workshop - BSides Austin 2014
Beating Spam On Your WordPress Website - WordCamp Melbourne 2013
Ask a Malware Archaeologist
Locking down word press
Protect Your WordPress From The Inside Out
Ad

Viewers also liked (20)

PPTX
Serial Killers Presentation1
PDF
Android Application: Introduction
PDF
Functional style programming
PDF
What is Network Security?
PPTX
Trends in spies
PPTX
Noah Z - Spies
PDF
Android UI
PPT
PPT
PPTX
Functional programming with python
PPT
Intoduction to Network Security NS1
PPTX
Carrick - Introduction to Physics & Electronics - Spring Review 2012
PDF
ICCV2009: MAP Inference in Discrete Models: Part 5
PDF
Scalable Internet Servers and Load Balancing
PPTX
Intelligence, spies & espionage
PPTX
CITY OF SPIES BY SORAYYA KHAN
PPTX
Lecture#01
PDF
Functional Programming in R
PDF
Uni cambridge
 
Serial Killers Presentation1
Android Application: Introduction
Functional style programming
What is Network Security?
Trends in spies
Noah Z - Spies
Android UI
Functional programming with python
Intoduction to Network Security NS1
Carrick - Introduction to Physics & Electronics - Spring Review 2012
ICCV2009: MAP Inference in Discrete Models: Part 5
Scalable Internet Servers and Load Balancing
Intelligence, spies & espionage
CITY OF SPIES BY SORAYYA KHAN
Lecture#01
Functional Programming in R
Uni cambridge
 
Ad

Similar to Securing Windows web servers (20)

PPT
Joomla Security
PPT
Joomla Security
PPTX
Domino Fitness. Time for a Health Check
PDF
Seven steps to better security
PDF
Tips to Remediate your Vulnerability Management Program
PPT
0828 Windows Server 2008 新安全功能探討
PDF
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
PPTX
Getting Started with IBM i Security: Securing PC Access
ODP
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
PPTX
Seurity In Vista
PPTX
ObserveIT Remote Access Monitoring Software - Corporate Presentation
PPT
Bh Win 03 Rileybollefer
PPT
Getting Started with Enterprise Library 3.0 in ASP.NET
PPT
Fortress SQL Server
PPTX
Governance Configure Customise Code
PPT
Download It
PPT
Network administrationcode Lecture 1.ppt
PDF
Windows server hardening 1
ODP
WordPress Security - Kulpreet Singh
PPT
Windows 7 Seminar - Acend Corporate Learning
Joomla Security
Joomla Security
Domino Fitness. Time for a Health Check
Seven steps to better security
Tips to Remediate your Vulnerability Management Program
0828 Windows Server 2008 新安全功能探討
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Getting Started with IBM i Security: Securing PC Access
Planning Optimal Lotus Quickr services for Portal (J2EE) Deployments
Seurity In Vista
ObserveIT Remote Access Monitoring Software - Corporate Presentation
Bh Win 03 Rileybollefer
Getting Started with Enterprise Library 3.0 in ASP.NET
Fortress SQL Server
Governance Configure Customise Code
Download It
Network administrationcode Lecture 1.ppt
Windows server hardening 1
WordPress Security - Kulpreet Singh
Windows 7 Seminar - Acend Corporate Learning

More from Information Technology (20)

PDF
Sql Server Security Best Practices
PPT
SQL 2005 Disk IO Performance
PPT
PPT
Review of SQL
PPT
Sql 2005 high availability
PPT
IIS 7: The Administrator’s Guide
PPT
MOSS 2007 Deployment Fundamentals -Part2
PPT
MOSS 2007 Deployment Fundamentals -Part1
PPT
Clustering and High Availability
PDF
F5 beyond load balancer (nov 2009)
PPT
WSS 3.0 & SharePoint 2007
PPT
SharePoint Topology
PDF
Sharepoint Deployments
PPT
Microsoft Clustering
PPT
PPT
Migration from ASP to ASP.NET
PPT
Internet Traffic Monitoring and Analysis
PPT
Windows network security
PPT
SQL -PHP Tutorial
Sql Server Security Best Practices
SQL 2005 Disk IO Performance
Review of SQL
Sql 2005 high availability
IIS 7: The Administrator’s Guide
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part1
Clustering and High Availability
F5 beyond load balancer (nov 2009)
WSS 3.0 & SharePoint 2007
SharePoint Topology
Sharepoint Deployments
Microsoft Clustering
Migration from ASP to ASP.NET
Internet Traffic Monitoring and Analysis
Windows network security
SQL -PHP Tutorial

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Cell Types and Its function , kingdom of life
PPTX
GDM (1) (1).pptx small presentation for students
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Lesson notes of climatology university.
PDF
Computing-Curriculum for Schools in Ghana
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Institutional Correction lecture only . . .
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
Pre independence Education in Inndia.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
VCE English Exam - Section C Student Revision Booklet
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Types and Its function , kingdom of life
GDM (1) (1).pptx small presentation for students
102 student loan defaulters named and shamed – Is someone you know on the list?
Lesson notes of climatology university.
Computing-Curriculum for Schools in Ghana
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Institutional Correction lecture only . . .

Securing Windows web servers

  • 2. Agenda Physical Security OS Installation Account Policies Local Policies Services User Accounts IP Policies Permissions Hardening IIS Additional Hardening
  • 4. General Who should take this course System Consultants Security Consultants System Architects Anyone who is responsible for the configuration and/or the administration of a Windows 2003 environment
  • 5. General Strategy: Creating a secure environment Secure current and/or new implementations of the Windows 2003 operating system
  • 6. General Strategy: Maintaining a secure environment Maintain a secure environment by staying on top of security issues that are relevant to your installation This is a proactive process!!
  • 7. General Scope of this course This course will focus on the secure configuration of a Windows 2003 server hosting Internet Information Services (IIS) version 6.0
  • 8. General Prerequisites Experience with IT security Experience with MMC Experience deploying web applications in enterprise environments Some web application development knowledge will be useful but is not mandatory
  • 9. General What happens if I don’t harden my web server? Most systems can be compromised within 72 hours Corporate humilliation Won’t know if your system is has been/is being attacked Money wasted on reparation and down time Company data/ secrets could be stolen Some web sites are fed with data that comes from the same database as other internal systems
  • 10. Hardening one step at a time Physical Security --------------------------------------- OS Installation ----------------------------------------- Account Policies ---------------------------------------- Local Policies ------------------------------------------- Services ------------------------------------------------ User Accounts ----------------------------------------- IP Policies------------- --------------------------------- Permissions -------------------------------------------- Hardening IIS ------------------------------------------ Additional Hardening ---------------------------------- Number of Weaknesses
  • 11. Prerequisites What should Install ALL necessary software/ services before you begin. Make sure that they ALL work. Why? If software/ service dosn’t work: Because of the hardening? Did it work before we started? These are time wasting situations Let’s begin.
  • 13. Physical Security We assume that physical security is in place.
  • 15. OS Installation No system upgrades Why? Too many grey areas ONLY clean installations Two partitions (we shall be using one) 01  system files 02  web applications Strong administrative passwords Rainbow attacks make 8 character passwords trivial to break Only install necessary components
  • 16. OS Installation Use a static IP instead of DHCP if possible (one less service) If there are multiple servers in the DMZ, consider making a DMZ domain from which critical servers will inherit their baseline GPOs.
  • 18. Proof of concept scan Windows 2003 v. Windows 2000 Why bother using windows 2003? More secure by default. Can Windows 2000 be as secure? Yes. It requires work.
  • 19. Proof of concept scan Windows 2003 v. Windows 2000 We will use standard tools to inspect a default Windows 2003 installation. Tools to use: Nmap. Scans to perform: Nmap –sS –P0 –O –p1-65535 Nmap –sS –P0 –O –g 53 –p 1-65535 Nmap –sT –P0 –O –p1-65535 NStealth Windows 2003: xx.xx.xx.xx
  • 22. Policies Account Policies Never use dictionary words. Never reuse old passwords by altering only one digit. Never choose passwords based on pets, habits, likes or dislikes. One must never be able to identify a password by looking at the things on your desk. Use upper- and lowercase with symbols and numbers. Choose passwords based on phrases: Th15 comput€r i5 prot€cted by a str0ng p@ssword
  • 23. Policies Account Policies: password Policy Enforce Password History: 24 Maximum Password Age: 42 days Minimum Password Age: 2 days Minimum Password Length: 14 Complexity requirements: Enabled Use Reversible Encryption: Disabled
  • 24. Policies Account Policies: Account Lockout Policy Account Lockout Duration: 15 Minutes Account Lockout Threshold: 10 invalid attempts Reset Lockout Counter: 15 Minutes
  • 26. Services What services does a web-server need? Are you sure they are needed? YES: secure them NO: remove them This is the hardest to get right
  • 27. Or…
  • 28. System Settings Isn’t there a quicker way to change system settings? Yes. Meet the ” Security Analysis and Configuration” snap-in
  • 29. System Settings Security Analysis and Configuration Run mmc File  Add/Remove Snap-in Add  Security Configuration and Analysis  Add Right Click on Security Analysis and Configuration  Open Database Choose a File Name  Open Navigate to ”High Security Baseline.inf”  Open Right Click on Security Analysis and Configuration  Analyse Computer Now… Save the log to your desktop
  • 31. User Accounts Securing Well known User Accounts Rename all built-in accounts: Administrator Guest Why? Everyone knows the names of these two Windows accounts. 50% of a brute force attack is already common knowledge. The descriptions should also be altered.
  • 32. User Accounts Securing Well known User Accounts Assign strong passwords to these accounts Th15 1s @ v€ry st0ng p@s5word don’t y0u th1nk? Disable default guest accounts (if not already done by default)
  • 34. IP Policies Structure IP Filter advice: give your rules good names. Examples might look like this: <POLICY> <DIRECTION> <SERVICE> Permit INBOUND HTTP(S) Permit OUTBOUND SSH Permit OUTBOUND DNS Permit OUTBOUND HTTP(S) Deny BIDIRECTIONAL ALL
  • 35. IP Policies Example scenario A web server might look similar to this: Permit INBOUND: HTTP HTTPS? TS? Permit OUTBOUND: HTTP HTTPS DNS
  • 36. IP Policies Local Security Settings
  • 37. IP Policies Lets get started Create IP Security Policy… Name: Secure Web Uncheck “Activate the default response rule” Check “Edit Properties” Uncheck “Use Add Wizard”
  • 38. IP Policies Basic rules Create 4 rules Deny BIDIRECTIONAL ALL Permit INBOUND HTTP(S) Permit OUTBOUND HTTP(S) Permit OUTBOUND DNS When you’re done, assign your new policy
  • 39. IP Policies Lets look at the results Tools needed: NMap Exercise Groups of two or three Choose which computer will perform the scan Un-assign IP Policies as they also block outboud traffic Perform the following port scans: Nmap –sS –P0 –O –p1-65535 Nmap –sS –P0 –O –g 53 –p 1-65535 Nmap –sT –P0 –O –p1-65535
  • 41. Permissions Assigning correct NTFS permissions CGI files: .EXE, .DLL, .CMD, .PL Administrators: Full Control System: Full Control IUSR_SERVER: Read & Execute, Read Script Files: .ASPX, .ASP, .PHP Administrators: Full Control System: Full Control IUSR_SERVER: Read & Execute, Read Include Files: .INC, .SHTML, .SHTM Administrators: Full Control System: Full Control IUSR_SERVER: Read & Execute, Read
  • 42. Permissions Assigning correct NTFS permissions Static Files: .HTML, .HTM, .TXT, .GIF, .JPG Administrators: Full Control System: Full Control IUSR_SERVER: Read Data Files: .MDB Administrators: Full Control System: Full Control IUSR_SERVER: Read, Write, Read & Execute, Modify
  • 44. Hardening IIS Web server extensions Application Debugging Custom Errors HTTP Verbs URL Scan Logging
  • 45. Web server Extensions Predefined Web Service Extensions Everything is turned off by default A default IIS 6.0 installation will only run sites with static pages, .HTML, .HTM.
  • 46. Web server Extensions Predefined Web Service Extensions (cont.) Active Server Pages ASP.NET version 1.1.4322 FrontPage Server Extensions 2002 Internet Data Connector Server-Side Includes WebDAV
  • 47. Application Debugging Stop IIS from sending error messages to clients Stop applications from sending debugging details to clients: Right click on your web site in the IIS manager Home Directory  Configuration App Debugging Check ”Send text error to client” and leave the box blank
  • 48. Custom Errors Redirect to a custom error page when error occur Send custom error pages to clients for HTTP 500’s, 404’s: Right click on your web site in the IIS manager Custom Errors  double click on 500 Message Type: URL URL: /<LOCATION OF CUSTOM PAGE> Make certain that error 500 messages don’t get sent to the browser!
  • 49. HTTP Verbs Limit access to HTTP Verbs Remove all un-needed HTTP verbs from each application: Generally required: GET, HEAD, POST
  • 50. URL Scan Url filtering What is URL Scan? What can it do? Enable/disable HTTP verbs Disable HTTP headers Enable/disable specific file extensions Disable character sequences Remove/alter the server header Restrict header lengths Questions concerning URL Scan?
  • 51. URL Scan Url filtering How does it work: Configuration File Installation Fine tuning
  • 52. Logging Configuring Logging Create seperate logs for each site Log Folder Permissions Administrators: Full Control System: Full Control IUSR_SERVER: Read, Write, Modify, List Folder Contents, Read & Execute
  • 54. Additional Hardening Uninstallable Components Special Binaries
  • 55. Uninstallable Components Load “%systemroot%\inf\ sysoc.inf” into notepad Replace ”hide” with ”” Run Add/Remove Applications Remove any unwanted/ unneeded components (be careful!)
  • 56. Special Binaries Several executables exist on a standard Windows 2000 installation that could become rather useful to an attacker Special access rights need to be set on all of these executables
  • 57. Special Binaries (cont.) Uncheck ”Allow inheritable permissions from parent to propagate this object”. Remove all users from the name list, including SYSTEM. Assign ”Full Control” to a user that is to be used to access these files – an administrator.
  • 58. Special Binaries (cont.) rsh.exe, secfixup.exe, telnet.exe, tftp.exe, ipconfig.exe, nbtstat.exe, netstat.exe, ping.exe, qbasic.exe, rdisk.exe, regdit32.exe, net.exe, nslookup.exe, posix.exe, rcp.exe, regedit.exe, rexec.exe, tracert.exe, command.com, regedit.exe, os2.exe, os2ss.exe, arp.exe, at.exe, atsvc.exe, cacls.exe, cmd.exe, debug.exe, edit.com, edlin.exe, finger.exe, ftp.exe, xcopy.exe, os2srv.exe, cscript.exe, wscript.exe, iisreset.exe, route.exe, runonce.exe, syskey.exe
  • 59. What have we learned today? Physical Security OS Installation Account Policies Local Policies Services User Accounts IP Policies- Permissions Hardening IIS Additional Hardening
  • 60. ?