19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

208<br />

Part IV: Hacking Operating Systems<br />

The shares displayed in Figure 11-5 are just what malicious insiders are looking<br />

for because the share names give a hint of what type of files might be<br />

accessible if they connect to the shares. After the bad guys discover these<br />

shares, they’re likely to dig a little further to see whether they can browse<br />

the files within the shares. I cover shares and rooting out sensitive information<br />

on network shares and other storage devices in Chapter 15.<br />

Countermeasures against NetBIOS attacks<br />

You can implement the following security countermeasures to minimize<br />

NetBIOS and NetBIOS over TCP/IP attacks on your Windows systems:<br />

✓ Use a network firewall.<br />

✓ Use Windows Firewall or some other personal firewall software on each<br />

system.<br />

✓ Disable NetBIOS — or at least Windows File and Printer Sharing.<br />

Disabling NetBIOS might not be practical in a network where users and<br />

applications depend on file sharing or in a mixed environment where<br />

older Windows 2000 and NT systems rely on NetBIOS for file and printer<br />

sharing.<br />

✓ Educate your users on the dangers of enabling file shares for everyone<br />

to access. I cover these risks in detail in Chapter 15.<br />

Hidden shares — those with a dollar sign ($) appended to the end of the share<br />

name — don’t really help hide the share name. Any of the tools I’ve mentioned<br />

can see right through this form of security by obscurity. In fact, if you come<br />

across such shares, you’ll want to look at them more closely, as a user may be<br />

trying to hide something.<br />

Detecting Null Sessions<br />

A well-known vulnerability within Windows can map an anonymous connection<br />

(or null session) to a hidden share called IPC$ (which stands for interprocess<br />

communication). This attack method can be used to<br />

✓ Gather Windows host configuration information, such as user IDs and<br />

share names.<br />

✓ Edit parts of the remote computer’s registry.<br />

Although Windows Server 2008, Windows XP, Windows 7, and Windows 8 don’t<br />

allow null session connections by default, Windows 2000 Server does — and<br />

(sadly) plenty of those systems are still around to cause problems on most<br />

networks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!