11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

460 Part IV: Securing Your Network, Host, <strong>and</strong> <strong>Application</strong>4. Click the ISAPI Filters tab.The tabbed page shown in Figure 16.5 is displayed:Figure 16.5Removing unused ISAPI filtersStep 14. IIS Metabase<strong>Security</strong> <strong>and</strong> other IIS configuration settings are maintained in the IIS metabase file.Harden the NTFS permissions on the IIS metabase (<strong>and</strong> the backup metabase file) tobe sure that attackers cannot modify your IIS configuration in any way (for example,to disable authentication for a particular virtual directory.)During this step, you:● Restrict access to the metabase using NTFS permissions.●Restrict banner information returned by IIS.Restrict Access to the Metabase Using NTFS PermissionsSet the following NTFS permissions on the IIS metabase file (Metabase.bin) in the\WINNT\system32\inetsrv directory.● Local System: Full Control● Administrators: Full ControlRestrict Banner Information Returned by IISBanner information can reveal software versions <strong>and</strong> other information that may helpan attacker. Banner information can reveal the software you run, allowing an attackerto exploit known software vulnerabilities.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!