11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

524 Part IV: Securing Your Network, Host <strong>and</strong> <strong>Application</strong>When you install SQL Server, it creates the following registry entries <strong>and</strong> subentries:●For a default instance:HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\MSSQLSERVER●For a named instance:HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\MICROSOFT SQL SERVER\INSTANCENAME●For the SQL service:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MSSQLSERVERIn this step, you:● Verify permissions for the SQL Server registry keys.●Secure the SAM (st<strong>and</strong>-alone servers only).Verify Permissions for the SQL Server Registry KeysUse Regedt32.exe to verify the Everyone group does not have permissions on theSQL Server registry keys, listed above. The following controls are in place by default:Administrators: Full ControlSQL Server service account: Full ControlNote The Microsoft Baseline <strong>Security</strong> Analyzer will verify the registry permissions. Use the tool asan alternative to manually verifying the permissions with Regedt32.exe.Secure the SAM (St<strong>and</strong>-alone Servers Only)St<strong>and</strong>-alone servers store account names <strong>and</strong> one-way password hashes (LMHash) inthe local SAM database, which is part of the registry. Generally, only members of theAdministrators group have access to the account information.Although the passwords are not actually stored in the SAM <strong>and</strong> password hashes arenot reversible, if an attacker obtains a copy of the SAM database, he or she can usebrute force password cracking techniques to obtain valid credentials.Restrict LMHash storage in the SAM by creating the key (not value) NoLMHash inthe registry as shown below.HKLM\System\CurrentControlSet\Control\LSA\NoLMHashFor more information, see Microsoft Knowledge Base article 299656, “New RegistryKey to Remove LM Hashes from Active Directory <strong>and</strong> <strong>Security</strong> Account Manager.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!