11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

450 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>Restrict Remote Administration of the RegistryThe Winreg key determines whether registry keys are available for remote access. Bydefault, this key is configured to prevent users from remotely viewing most keys in theregistry, <strong>and</strong> only highly privileged users can modify it. On Windows 2000, remoteregistry access is restricted by default to members of the Administrators <strong>and</strong> Backupoperators group. Administrators have full control <strong>and</strong> backup operators have readonlyaccess.The associated permissions at the following registry location determine who canremotely access the registry.HKLM\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winregTo view the permissions for this registry key, run Regedt32.exe, navigate to the key,<strong>and</strong> choose Permissions from the <strong>Security</strong> menu.Note Some services require remote access to the registry. Refer to Microsoft Knowledge Basearticle 153183, “How to Restrict Access to the Registry from a Remote Computer,” to see if yoursituation dem<strong>and</strong>s limited remote registry access.Secure the SAM (St<strong>and</strong>-alone Servers Only)St<strong>and</strong>-alone servers store account names <strong>and</strong> one-way (non-reversible) passwordhashes (LMHash) in the local <strong>Security</strong> Account Manager (SAM) database. The SAM ispart of the registry. Typically, only members of the Administrators group have accessto the account information.Although the passwords are not actually stored in the SAM <strong>and</strong> password hashes arenot reversible, if an attacker obtains a copy of the SAM database, the attacker can usebrute force password techniques to obtain valid user names <strong>and</strong> passwords.Restrict LMHash storage in the SAM by creating the key (not value) NoLMHash inthe registry as follows:HKLM\System\CurrentControlSet\Control\LSA\NoLMHashFor more information, see Microsoft Knowledge Base article 299656, “New RegistryKey to Remove LM Hashes from Active Directory <strong>and</strong> <strong>Security</strong> Account Manager.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!