Reading your way around UAC
|
|
- Toby Gardner
- 6 years ago
- Views:
Transcription
1 Reading your way around UAC Abusing Access Tokens for UAC Bypasses James
2 What I m Going to Talk About Why Admin-Approval UAC is even worse than you thought! Why Over-the-Shoulder UAC is still worse than you thought!
3 UAC Architecture AppInfo Service Limited User Logon Session Authentication-ID = A-B Application RPC Elevated User Logon Session Authentication-ID = X-Y
4 UAC Architecture AppInfo Service Limited User Logon Session Authentication-ID = A-B Application ShellExecute runas RPC Elevated User Logon Session Authentication-ID = X-Y
5 UAC Architecture AppInfo Service Limited User Logon Session Authentication-ID = A-B RPC Application ShellExecute runas consent.exe Elevated User Logon Session Authentication-ID = X-Y
6 UAC Architecture AppInfo Service Limited User Logon Session Authentication-ID = A-B RPC Elevated User Logon Session Authentication-ID = X-Y Application ShellExecute runas Application
7 Linked Tokens
8 Linked Tokens
9 Deny-Only Groups Link
10 Also Fewer Privileges Link
11 The Problem with UAC Limited User Logon Session Authentication-ID = A-B Non-Admin Application Current User Registry Hive User Profile Directory Desktop and Kernel Objects Elevated User Logon Session Authentication-ID = X-Y Admin Application
12 The Problem with UAC Limited User Logon Session Authentication-ID = A-B Non-Admin Application Current User Registry Hive User Profile Directory Desktop and Kernel Objects Elevated User Logon Session Authentication-ID = X-Y Admin Application
13 Kernel Object Login Sid Non-Admin Token Groups Admin Token DACL
14 NtUserGetClipboardToken Win32k Wr ite to C lip b oa rd Kernel UAC Admin Process Captured Token Non-Admin Process
15 NtUserGetClipboardToken Kernel erg Us Nt Win32k lip etc n ke To ard bo Captured Token UAC Admin Process Non-Admin Process
16 NtUserGetClipboardToken Kernel Win32k Captured Token Op en e df UAC Admin Process or rea d Non-Admin Process
17 Clipboard Token Read-only access
18 Creating a New Process Parent Token Sibling Token Process Token Token ID OR Equal Parent Token ID Assigned Token Process Token Parent Token ID Equal Assigned Token Parent Token ID Equal Auth ID Auth ID
19 Creating a New Process Parent Token Sibling Token Process Token Token ID OR Equal Parent Token ID Assigned Token Process Token Parent Token ID Equal Assigned Token Parent Token ID Equal Auth ID Auth ID
20 Impersonating a Token Token Level == Identification ALLOWED Process has Impersonate Privilege Process IL >= Token IL Process User == Token User Restrict to Identification Level
21 Impersonating a Token Token Level == Identification ALLOWED Process has Impersonate Privilege Process IL >= Token IL Process User == Token User Restrict to Identification Level
22 Impersonating a Token Token Level == Identification ALLOWED Process has Impersonate Privilege Process IL >= Token IL Process User == Token User Restrict to Identification Level
23 Impersonating a Token Token Level == Identification ALLOWED Process has Impersonate Privilege Process IL < Token IL Process User == Token User Restrict to Identification Level
24 Reduce the Integrity Level
25 Reduce the Integrity Level
26 Impersonating a Token Token Level == Identification ALLOWED Process has Impersonate Privilege Process IL >= Token IL Process User == Token User Restrict to Identification Level
27 High IL!= Administrator Create and modify files in system locations Create and modify system services Open >= high IL processes for R/W Interact with >= high IL Windows (UIPI)
28 No God Privileges The following are not allowed to be enabled for a Medium IL token. Privilege Possible Privileged Operations SeCreateTokenPrivilege Create new token objects SeTcbPrivilege Many and varied privileged operations SeLoadDriverPrivilege Load a driver into the kernel SeDebugPrivilege Bypass process/thread security checks SeBackupPrivilege Bypass file/key security checks for read SeRestorePrivilege Bypass file/key security checks for write SeImpersonatePrivilege Impersonate arbitrary users
29 Stealing Tokens
30 OpenProcessToken We only have Query Limited Information
31 Only Limited Information?
32 Start an Elevated Process? Standard auto-elevation of specific MS binaries.
33 Scheduled Tasks If set will spawn elevated process with no UAC prompt.
34 DEMO
35 Changes in Windows 10 Token Level == Identification Process has Impersonate Privilege Process IL >= Token IL Capability Check Process User == Token User Elevation Check ALLOWED Restrict to Identification Level
36 Elevation Checks if (SeTokenIsElevated(ImpersonationToken)) { if (!SeTokenIsElevated(ProcessToken) ProcessToken->LogonSession->Flags.UacSession) { return STATUS_PRIVILEGE_NOT_HELD; } } // Continue with impersonation check.
37 What Makes a Token Elevated? Has God privileges or certain elevated groups BOOLEAN RtlIsElevatedRid(SID_AND_ATTRIBUTES *sid_and_attr) { DWORD last_rid = GetLastRid(sid_and_attr->Sid); DWORD check_rids[] = { 512, 544,... }; for(int i = 0; i < countof(check_rids); ++i) { if (check_rids[i] == last_rid) { return TRUE; } } For example: return FALSE; BUILTIN\Administrators == S }
38 Use NtFilterToken
39 Use Non-God Privileges Privilege Possible Privileged Operations SeCreateGlobalPrivilege Create new sections in global BNO directory SeCreatePageFilePrivilege Create or modify page/hibernation files SeCreateSymbolicLinkPrivilege Create arbitrary NTFS symbolic links SeManageVolumePrivilege Mount/Unmount volumes including VHDs SeSecurityPrivilege Modify SACL entries SeSystemEnvironmentPrivilege Modify UEFI boot variables
40 Bouncing to Elevated Session WMI Limited User Logon Session Authentication-ID = A-B Flags = UacSession Win32_Process Elevated User Logon Session Authentication-ID = X-Y Flags = None Application Impersonate Non-Admin Token Non-Admin Application Impersonate Admin Token
41 DEMO
42 LogonUser New Credentials LSASS Limited User Logon Session Authentication-ID = A-B LogonUser Elevated User Logon Session Authentication-ID = X-Y Application Impersonate Non-Elevated Token Elevated Token // Clone token with new credentials. LogonUser("Badger", "Badger", "Badger", LOGON32_LOGON_NEW_CREDENTIALS, &Token); Admin Token
43 Abuse Secondary Logon ImpersonateLoggedOnUser(hNonElevatedToken); CreateProcessWithLogonW( "Badger", "Badger", "Badger", Equivalent to LOGON_NETCREDENTIALS_ONLY NULL, L"cmd.exe", &proc_info); LOGON32_LOGON_NEW_CREDENTIALS
44 DEMO
45 Over-The-Shoulder Elevation
46 Separation of Resources Normal User Logon Session Authentication-ID = A-B Normal User Registry Hive Admin User Registry Hive User Profile Directory Admin Profile Directory Non-Admin Application Elevated User Logon Session Authentication-ID = X-Y Admin Application Desktop and Kernel Objects
47 Impersonating an OTS Token Token Level == Identification ALLOWED Process has Impersonate Privilege Process IL >= Token IL Process User == Token User Restrict to Identification Level
48 Impersonating an OTS Token Token Level == Identification Process has Impersonate Privilege Process IL >= Token IL Capability Check Process User == Token User ALLOWED Restrict to Identification Level
49 Capability Check BOOLEAN SepIsImpersonationAllowedDueToCapability(PTOKEN token, PTOKEN imp_token) { if ((token->sessionid!= imp_token->sessionid) Tokens must be in (token->tokenflags & TOKEN_FLAGS_LOWBOX) == 0) same Session and (imp_token->tokenflags & TOKEN_FLAGS_LOWBOX) == 0)) { both be LowBox. return FALSE; } if (!SepSidInTokenSidHash(&token->CapabilitiesHash, SeConstrainedImpersonationCapabilitySid)!SepCheckCapabilities(token, imp_token->capabilities)!rtlequalsid(token->package, imp_token->package)) { return FALSE; } return TRUE; } Process token must have impersonation capability, and be in same package.
50 Enterprise Authentication
51 DEMO
52 Is Anything Safe? Hit CTRL+ALT+DEL and click
53 Conclusions Admin-Approval UAC is broken Over-the-sholder UAC is pretty broken on Windows 10 Best chance you have is fast-user switching Don t switch using Explorer, always use the secure attention sequence
54 Thanks Any Questions?
How Windows Security Really Works?
Sami Laiho Senior Technical Fellow, MVP Adminize.com / Win-fu.com sami@adminize.com BLOG.WIN-FU.COM @samilaiho How Windows Security Really Works? Configuration Manager Sami Laiho Senior Technical Fellow
More informationReverse Engineering with Vola2lity on a Live System: The Analysis of Process Token Privileges. Cem Gurkok Threat Intelligence Terremark
Reverse Engineering with Vola2lity on a Live System: The Analysis of Process Token Privileges Cem Gurkok Threat Intelligence Terremark Summary whoami Processes, Tokens and Privileges Where s the data Making
More informationSecurity. Outline. Security Ratings. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline Ratings System Components Logon Object (File) Access Impersonation Auditing 2 Ratings National Computer Center (NCSC) part
More informationOutline. Security. Security Ratings. TCSEC Rating Levels. Key Requirements for C2. Met B-Level Requirements
Outline Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Ratings System Components 2 Ratings TCSEC Rating Levels National Computer Center (NCSC) part of US Department of Defense
More informationA Process is No One: Hunting for Token Manipulation. Jared Atkinson & Robby Winchester
Jared Atkinson Robert Winchester A Process is No One: Hunting for Token Manipulation Jared Atkinson & Robby Winchester @jaredcatkinson Adversary Detection Technical Lead @ SpecterOps Developer: PowerForensics
More informationRoadmap for This Lecture
Windows Security 2 Roadmap for This Lecture Windows Security Features Components of the Security System Protecting Objects Security Descriptors and Access Control Lists Auditing and Impersonation Privileges
More informationOperating system security models
Operating system security models Unix security model Windows security model MEELIS ROOS 1 General Unix model Everything is a file under a virtual root diretory Files Directories Sockets Devices... Objects
More information? Resource. Announcements. Access control. Access control in operating systems. References. u Homework Due today. Next assignment out next week
Announcements Access control John Mitchell u Homework Due today. Next assignment out next week u Graders If interested in working as grader, send email to Anupam u Projects Combine some of the project
More informationServer. Client LSA. Winlogon LSA. Library SAM SAM. Local logon NTLM. NTLM/Kerberos. EIT060 - Computer Security 2
Local and Domain Logon User accounts and groups Access tokens Objects and security descriptors The Register Some features in Windows 7 and Windows 8 Windows XP evolved from Windows 2000 Windows 10, 8,
More informationTeam TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation )
Team TimeSheet for Outlook & SharePoint Client Installation and Configuration ( Per User Installation and Per Machine Installation ) Page 1 This install is meant for normal users who would be preparing
More informationBITSInject. Control your BITS, get SYSTEM. Dor Azouri Security
BITSInject Control your BITS, get SYSTEM Dor Azouri Security Researcher @SafeBreach Background Intelligent Transfer Service 2 A couple more bits about BITS Available since 2001 (Windows XP) Most known
More informationRemote Process Explorer
Remote Process Explorer Frequently Asked Questions LizardSystems Table of Contents Introduction 3 What is Remote Process Explorer? 3 Before Installing 3 How can I download Remote Process Explorer? 3 Will
More informationSecurity settings for Domain users in IDM 4.0.3
IBM Security settings for Domain users in IDM 4.0.3 Handling security issues faced by Domain users in IDM 4.0.3 Divya Mallya and Subha Thangaraj About the authors: Divya Mallya is a software developer
More informationCS 290 Host-based Security and Malware. Christopher Kruegel
CS 290 Host-based Security and Malware Christopher Kruegel chris@cs.ucsb.edu Windows Windows > 90 % of all computers run Windows when dealing with security issues, it is important to have (some) knowledge
More informationWindows Access Control List (ACL) 2
What do we have in this session? Windows Access Control List (ACL) 2 1. Access Control Lists (ACLs) 2. Object-specific ACEs 3. Trustees 4. Access Rights and Access Masks 5. ACCESS_MASK 6. Access Mask format
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationRID HIJACKING Maintaining Access on Windows Machines.
RID HIJACKING Maintaining Access on Windows Machines. Security Conference Bogotá, Colombia. 2018 Agenda 0x01. Exposing the RID Hijacking Attack. 0x02. Windows Logon in a nutshell. 0x03. Hijacking the RID.
More informationSecret Server Demo Outline
Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during
More information10 Active Directory Misconfigurations That Lead to Total Compromise Austin, TX 201 W 5th St.
10 Active Directory Misconfigurations That Lead to Total Compromise hello@javelin-networks.com +1-888-867-5179 Austin, TX 201 W 5th St. 1. Group Policy Preferences Visible Passwords Group Policy Preferences
More informationRemoteHelp User Guide
Rsupport Inc. RemoteHelp User Guide RemoteHelp User Guide version 1.0 INDEX Glossary... 5 2 RemoteHelp Introduction... 7 What is RemoteHelp?... 7 Recommended specifications for the Representative and Customer...
More informationSecuring ArcGIS Services
Federal GIS Conference 2014 February 10 11, 2014 Washington DC Securing ArcGIS Services James Cardona Agenda Security in the context of ArcGIS for Server Background concepts Access Securing web services
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More informationSecure Architecture Principles
CS 155 Spring 2017 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Secure Architecture Principles Isolation
More informationPass-the-Hash Attacks
Pass-the-Hash Attacks Mgr. Michael Grafnetter www.dsinternals.com Agenda PtH Attack Anatomy Mitigation Proactive Reactive Windows 10 + Windows Server 2016 Microsoft Advanced Threat Analytics PtH Attack
More informationA Survey of Access Control Policies. Amanda Crowell
A Survey of Access Control Policies Amanda Crowell What is Access Control? Policies and mechanisms that determine how data and resources can be accessed on a system. The Players Subjects Objects Semi-objects
More informationActive Directory Attacks and Detection
Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos Lab Setup AJLAB.COM: 2 Domain
More informationSecure Architecture Principles
CS 155 Spring 2016 Secure Architecture Principles Isolation and Least Privilege Access Control Concepts Operating Systems Browser Isolation and Least Privilege Acknowledgments: Lecture slides are from
More informationMANAGEMENT AND CONFIGURATION MANUAL
MANAGEMENT AND CONFIGURATION MANUAL Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE TABS...
More informationToken Kidnapping. Cesar Cerrudo Argeniss
Token Kidnapping Cesar Cerrudo Argeniss Who am I? Argeniss Founder and CEO I have been working on security for 7 years I have found and helped to fix hundreds of vulnerabilities in software such as MS
More informationWindows Vista User Account Control (UAC) and Delphi. Fredrik Haglund Developer Evangelist
Windows Vista User Account Control (UAC) and Delphi Fredrik Haglund Developer Evangelist User Account Control (UAC) Security token split during logon one user token and one admin token Administrator shell
More informationTable of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17
Migrating from NIMS to OMS 17.3.2.0 User Guide 7 Dec 2017 Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Before migrating to OMS... 3 Purpose of this migration guide...3 Name changes from NIMS
More informationLast mile authentication problem
Last mile authentication problem Exploiting the missing link in end-to-end secure communication DEF CON 26 Our team Sid Rao Doctoral Candidate Aalto University Finland Thanh Bui Doctoral Candidate Aalto
More informationSecurity Essentials. Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems.
Security Essentials Working with Systems Management Server (SMS) 2.0 to maximize SMS security and avoid security-related problems. 2000 Microsoft Corporation. All rights reserved. The information contained
More informationFull file at Chapter 2: Securing and Troubleshooting Windows Vista
Chapter 2: Securing and Troubleshooting Windows Vista TRUE/FALSE 1. An elevated command prompt can only be attained by an administrator after he or she has responded to a UAC box. T PTS: 1 REF: 70 2. There
More informationSecure Architecture Principles
Computer Security Course. Secure Architecture Principles Slides credit: Dan Boneh What Happens if you can t drop privilege? In what example scenarios does this happen? A service loop E.g., ssh Solution?
More informationIS 2150 / TEL 2810 Information Security and Privacy
IS 2150 / TEL 2810 Information Security and Privacy James Joshi Professor, SIS Access Control OS Security Overview Lecture 2, Sept 6, 2016 1 Objectives Understand the basics of access control model Access
More informationSPB SE Remote LAB Platform Information
SPB SE Remote LAB Platform Information Table of Contents Introduction... 2 How to book the LAB?... 3 Using Remote Desktop... 3 Using VIA... 6 LAB Infrastructure... 8 Network diagram... 9 Video Server and
More informationThinManager and FactoryTalk View SE Deployment Guide
Application Technique Original Instructions ThinManager and FactoryTalk View SE Deployment Guide Copyright 2019 Rockwell Automation Inc. All rights reserved Contents Background... 4 Goal of Configuration
More informationActive Directory Attacks and Detection Part -II
Active Directory Attacks and Detection Part -II #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos Key Takeaways How to
More informationExam Questions Demo Microsoft. Exam Questions Windows Server Administration Fundamentals
Microsoft Exam Questions 98-365 Windows Server Administration Fundamentals Version:Demo 1.Distributed File System (DFS) is used to: A. Delegate permissions to a global distribution group. B. Implement
More informationMonitoring Windows Systems with WMI
Monitoring Windows Systems with WMI ScienceLogic version 8.8.1 Table of Contents Introduction 4 Monitoring Windows Devices in the ScienceLogic Platform 5 What is SNMP? 5 What is WMI? 5 PowerPacks 5 Configuring
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or 5.6 to Cisco ISE, Release 2.0., page 1 Migrated Data
More informationJames 1
1 Obligatory Background Slide Researcher in Google s Project Zero Specialize in Windows Especially local privilege escalation Never met a logical vulnerability I didn t like 2 What I m Going to Talk About
More informationChapter 1: Windows Platform and Architecture. You will learn:
Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel
More informationLateral Movement Defcon 26. Walter Mauricio
Lateral Movement 101 @ Defcon 26 Walter Cuestas @wcu35745 Mauricio Velazco @mvelazco About Workshop goals Lab Environment Hands-on exercises & CTF #Whoarewe Walter Cuestas (@wcu35745) Mauricio Velazco
More informationComputers Gone Rogue. Abusing Computer Accounts to Gain Control in an Active Directory Environment. Marina Simakov & Itai Grady
Computers Gone Rogue Abusing Computer Accounts to Gain Control in an Active Directory Environment Marina Simakov & Itai Grady Motivation Credentials are a high value target for attackers No need for 0-day
More informationMANAGEMENT AND CONFIGURATION MANUAL
MANAGEMENT AND CONFIGURATION MANUAL Page 1 of 31 Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., page 1 Migrated
More informationWindows 7 Using Cmd From Guest Account
How To Change Administrator Password In Windows 7 Using Cmd From Guest Account To change the password of a specific user in windows 7 or 8.1, without knowing the current password, no hacker Then type in
More informationCommand Prompt Codes Bypass System Error 5 Has Occurred Access Denied
Command Prompt Codes Bypass System Error 5 Has Occurred Access Denied Close the Command Prompt window and reboot the machine, retry to connect the networks which are It says Access is denied system error
More informationServiceNow Deployment Guide
ServiceNow Deployment Guide (For Eureka release and forward) Okta Inc. 301 Brannan Street, 3 rd Floor San Francisco, CA, 94107 info@okta.com 1-888-722-7871 Contents Overview... 3 Active Directory Integration...
More information<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide
RSA SECURID ACCESS Standard Agent Client Implementation Guide VMware Horizon View 7.2 Clients Daniel R. Pintal, RSA Partner Engineering Last Modified: September 14, 2017
More informationHands-On Lab. Session 0 Isolation - Native. Lab version: 1.0.0
Hands-On Lab Session 0 Isolation - Native Lab version: 1.0.0 Last updated: 12/3/2010 CONTENTS OVERVIEW... 3 EXERCISE 1: MITIGATING SERVICE UI... 4 Task 1 - Install and Run the Service... 4 Task 2 - Modify
More informationIVE Quick Startup Guide - OS 4.0
IVE Quick Startup Guide - OS 4.0 Initial Setup Once you receive the IVE device, unpack the IVE and connect it to a PC or Laptop using the console (null modem) cable provided with the IVE. You have to connect
More informationJanuary 12, Prepared by Dina Borisov, Product manager Jetro Platforms. All rights reserved.
January 12, 2016 Prepared by Dina Borisov, Product manager 2015 Jetro Platforms. All rights reserved. Contents acockpit5 RDP Android Client... 3 Setting Two factor Authentication... 5 Configuring Two Factor
More informationAuthentication and Authorization in Enterprise Wikis
1 Authentication and Authorization in Enterprise Wikis Cindy Cicalese Approved for Public Release; Distribution Unlimited. Case Number 17-0713 2 Agenda Terminology A comparison of Wikimedia project wikis
More information10.User Password and Object Security
10-1 10.User Password and Object Security This chapter discusses the protection for operations provided by setting up user passwords and security classes. 10.1. Overview... 10-2 10.2. User Password and
More informationSMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide
SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015
More informationUnified CCE Security Compliance for Windows Server 2012 R2
Unified CCE Security Compliance for Windows Server 2012 R2 This topic contains the security baseline for hardening Windows Server 2012 R2 Servers running Unified CCE. This baseline is essentially a collection
More informationTzunami Deployer Confluence Exporter Guide
Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 3.2 Table of Contents PREFACE... II
More informationActive Directory Attacks and Detection
Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos This talk is Based on Tim Madin
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.2., page 1 Supported
More informationTzunami Deployer Confluence Exporter Guide
Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 2.7 Table of Content PREFACE... I INTENDED
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from, Release 5.5 or later to Cisco ISE, Release 2.3., page 1 Supported Data Objects for
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.3., on page 1 Supported
More informationDid You Get Your Token? Daniel and Azure (Keen Team)
Did You Get Your Token? Daniel and Azure (Keen Team) ABOUT US Daniel King ( 金龙 ) @long123king Keen Team Security Researcher 3/5 years working experience, former TrendMicro employee Windows Security Research,
More informationDefender Desktop Login GrIDsure Token User Guide
Desktop Login GrIDsure Token User Guide Introduction This guide describes what the user will see when using Desktop Login with GrIDsure tokens. The logon procedure will vary slightly depending on the platform
More information29 March 2017 SECURITY SERVER INSTALLATION GUIDE
29 March 2017 SECURITY SERVER INSTALLATION GUIDE Contents 1. Introduction... 2 1.1 Assumptions... 2 1.2 Prerequisites... 2 2. Required setups prior the Security Server Installation... 3 1.1 Create domain
More informationBI Office. Web Authentication Model Guide Version 6
Web Authentication Model Guide Version 6 Copyright Pyramid Analytics 2010-2016 Contents 1. Web Authentication Model Overview... 3 A. Basic Authentication Models... 3 B. Windows Authentication Models...
More informationProduct Documentation
Product Documentation Configuring Citrix XenDesktop Imprivata OneSign 5.5 SP1 Imprivata Confirm ID 5.5 SP1 2018 Imprivata, Inc. All Rights Reserved. This document includes information about configuring
More informationCIS Top 20 #5. Controlled Use of Administrative Privileges
CIS Top 20 #5 Controlled Use of Administrative Privileges CIS CSC #5: Controlled use of administrative privileges What is a privileged Account? Why are they Dangerous? What can we do about it? How
More informationOperating system security
Operating system security Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline Access control models in operating systems: 1. Unix 2. Windows Acknowledgements: This
More informationArcGIS for Server: Security
DevSummit DC February 11, 2015 Washington, DC Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow - ArcGIS Server Roles and Identity Stores - Authentication - Authorization: Securing
More informationIng. Ondrej Sevecek Windows Server Product Manager GOPAS a.s.
Kerberos Delegation aka double hop Ing. Ondrej Sevecek Windows Product Manager GOPAS a.s. MCM:Directory MVP:Enteprise Security Certified Ethical Hacker Certified Hacking Forensic Investigator CISA ondrej@sevecek.com
More informationCISNTWK-11. Microsoft Network Server. Chapter 4
CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows
More informationTeam Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above)
Team Helpdesk for Outlook Agent Installation and Configuration (for version 9 and above) Page 1 This install is meant for agents and technicians who would be working on support cases in the configured
More informationData Structure Mapping
This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., on page 1 Migrated
More informationInstallAware Consulting Services Project Scope Form
InstallAware Consulting Services Project Scope Form Please fill all the document's sections in order to provide a full description of your installation project's features and functionality. Use a single
More informationPass-the-Hash Attacks. Michael Grafnetter
Pass-the-Hash Attacks Michael Grafnetter www.dsinternals.com Agenda PtH Attack Anatomy Mitigation Proactive Reactive Windows 10 + Windows Server 2016 PtH History and Future 1988 Microsoft releases Lan
More informationAdministering Jive Mobile Apps for ios and Android
Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile
More informationClick Studios. Passwordstate. Remote Session Launcher. Installation Instructions
Passwordstate Remote Session Launcher Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
More informationArcGIS for Server: Administration and Security. Amr Wahba
ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server
More informationCyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems
Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems Section 1: Command Line Tools Skill 1: Employ commands using command line interface 1.1 Use command line commands to gain situational
More informationPentesting Windows Domains
Pentesting Windows Domains Active Directory security model and weaknesses 2017-01-09 Jean MARSAULT AGENDA / 01 Introduction / 02 The Active Directory model & Windows domains / 03 Pentesting Windows domains
More informationPassword policy settings control the complexity and lifetime for passwords. This section discusses each specific password policy setting
Windows Security Reference This document is a checklist of the security options with reference material (provided by Microsoft) for a Windows server implementation. The options are based on Windows 2003
More informationWindows Desktop Administration
tm realtimepublishers.com tm The Definitive Guide To Windows Desktop Administration Bob Kelly Chapter 5: Desktop Security...110 Written Security Policy...110 Defining Your Security Policy...110 Enforcing
More informationAbout. This is Abdelrahman Muhammad, a Unified Communication Expert at Orange Business services (OBS)
About This is Abdelrahman Muhammad, a Unified Communication Expert at Orange Business services (OBS) I starting my career in IT professional service companies, recently I work on Microsoft Unified Communication
More informationThe Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO
The Common Access Card The problems it solves (and the ones it doesn t) Quest Software/One Identity Dan Conrad Federal CTO 1 Disclaimer The views expressed in this presentation are those of the author(s)
More informationAdvanced ASP.NET Identity. Brock Allen
Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen
More informationOmega DB Scanner Standalone Free Edition For Oracle Database
Omega DB Scanner Standalone for Oracle Database - User s Guide 1.7.0 Omega DB Scanner Standalone Free Edition For Oracle Database January, 2017 OMEGA DB Scanner Standalone Free Edition For Oracle Database
More informationBomgar Vault Server Installation Guide
Bomgar Vault 17.2.1 Server Installation Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationAdministering Windows 7 Lesson 11
Administering Windows 7 Lesson 11 Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand BranchCache Use Backup and Restore program Troubleshooting
More informationConfigure advanced audit policies
7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy
More informationGoverlan Remote Control v7 vs. Microsoft Remote Assistance
Product Comparison vs. SYNOPSIS and both offer remote access services for Windows platforms. This paper provides a feature comparison between these two products. Publication Information This document was
More informationAn introduction to security in Windows 7
At a glance: Windows Biometric Framework Extending Authentication Profiles Bitlocker To Go UAC Improvements An introduction to security in Windows 7 Chris Corio Parts of this article are based on prerelease
More informationDemo Lab Guide vworkspace
Demo Lab Guide vworkspace Product Domain: Cloud Client Computing Author: Dan Coleman Version: 1.01 Table of Contents 1 Product Overview... 4 1.1 Lab Preparation Considerations and Caveats... 4 2 Introduction...
More informationChange Service Startup Type Command Line Windows 7
Change Service Startup Type Command Line Windows 7 Steps on how to prevent Windows programs from automatically loading every time your computer starts. Locate the service you want to disable and double-click
More informationexam.95q Installing and Configuring Windows 10
70-698.exam.95q Number: 70-698 Passing Score: 800 Time Limit: 120 min 70-698 Installing and Configuring Windows 10 Exam A QUESTION 1 In this section, you will see one or more sets of questions with the
More informationPass Microsoft Exam
Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION
More information