19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.52 Misuse of administrator rights in Windows<br />

NT systems<br />

Improper administration occurs when legitimately or non-legitimately<br />

acquired administrator authorisations and rights are deliberately used to<br />

damage the system or its users.<br />

Example:<br />

By improper use of the right to assume ownership of any files, an<br />

administrator, under Windows NT, can gain access to any files, even though<br />

their owner has explicitly refused him such access by means of appropriate<br />

access permissions. However, the gaining of access can be recognised by the<br />

original owner of the files, as the administrator has to make himself the owner<br />

of the files concerned in the process, and under Windows NT no function is<br />

available to undo this change again. Nevertheless, the administrator can gain<br />

access to user files without being noticed by, for example, registering with the<br />

backup operators’ group and making a backup of the files he wishes to read.<br />

<strong>The</strong>re are various opportunities for exploiting administrator rights in an<br />

improper manner. <strong>The</strong>se include illegal access to files, changes to the logging<br />

settings and the specifications for user accounts. Other possibilities of misuse<br />

lie in the falsification of protocol details, by altering the system time, or in the<br />

detailed tracking of the activities of individual users.<br />

Depending on the underlying hardware, where it is possible to gain access to<br />

the console and the system cabinet, the system can be booted up. This may<br />

enable the configuration to be manipulated if boot-up can be performed by an<br />

outside medium or if another operating system can be selected.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!