11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

436 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>If you are locking down a Windows 2000-based computer that hosts ASP.NET pages,select the Dynamic <strong>Web</strong> server template when the IISLockdown tool prompts you.When you select Dynamic <strong>Web</strong> server, IISLockdown does the following:●●●●●●It disables the following insecure Internet services:●●●File Transfer Protocol (FTP)E-mail service (SMTP)News service (NNTP)It disables script mappings by mapping the following file extensions to the 404.dll:●●●●●Index Server<strong>Web</strong> Interface (.idq, .htw, .ida)Server-side include files (.shtml, .shtm, .stm)Internet Data Connector (.idc).HTR scripting (.htr), Internet printing (.printer)It removes the following virtual directories: IIS Samples, MSADC, IISHelp, Scripts,<strong>and</strong> IISAdmin.It restricts anonymous access to system utilities as well as the ability to write to<strong>Web</strong> content directories using <strong>Web</strong> permissions.It disables <strong>Web</strong> Distributed Authoring <strong>and</strong> Versioning (<strong>Web</strong>DAV).It installs the URLScan ISAPI filter.Note If you are not using classic ASP, do not use the static <strong>Web</strong> server template. This templateremoves basic functionality that ASP.NET pages need, such as support for the POST comm<strong>and</strong>.Log FilesIISLockdown creates two reports that list the changes it has applied:●●%windir%\system32\inetsrv\oblt-rep.log. This contains high-level information.%windir%\system32\inetsrv\oblt-log.log. This contains low-level details such aswhich program files are configured with a deny access control entry (ACE) toprevent anonymous Internet user accounts from accessing them. This log file isalso used to support the IISLockdown Undo Changes feature.<strong>Web</strong> Anonymous Users <strong>and</strong> <strong>Web</strong> <strong>Application</strong> GroupsIISLockdown creates the <strong>Web</strong> Anonymous Users group <strong>and</strong> the <strong>Web</strong> <strong>Application</strong>group. The <strong>Web</strong> Anonymous Users group contains the IUSR_MACHINE account.The <strong>Web</strong> <strong>Application</strong> group contains the IWAM_MACHINE account. Permissionsare assigned to system tools <strong>and</strong> content directories based on these groups <strong>and</strong> notdirectly to the IUSR <strong>and</strong> IWAM accounts. You can review specific permissions byviewing the IISLockdown log, %windir%\system32\inetsrv\oblt-log.log.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!