
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 43
Step4Removeunusedandpotential lydangerouscomponents.
The“dangerous”componentsaslistedinthearticle“TechnicalReference:NTServer
4.0HardeningGuide”are:
“xcopy.exe,wscript.exe,cscript.exe,net.exe,ftp.exe,telnet.exe,arp.exe,edlin.exe,
ping.exe,route.exe,at.exe,finger.exe,posix.exe,rsh.exe,atsvc.exe,qbasic.exe,
runonce.exe,syskey.exe,cacls.exe,ipconfig.exe,rcp.exe,secfixup.exe,nbtstat.exe,
rdisk.exe,debug.exe,regedt32.exe,regedit.exe,edit.com,netstat.exe,tracert.exe,
NSLOOKUP.exe,rexec.exe, cmd.exe,NSLOOKUP.exe,tftp.exe, command. com”
7
Infact,wedonotneedtohavethemdisappeared.However,itisagoodideatohide
them.Wemaydothisbytakingthemawayfromtheiroriginallocationsandplace
theminaspecialdirectoryprotectedbyfinetunedNTFSACLsettings.
Step5Encryptthesystemaccountsdatabas e.
Withthehelpofthesyskey.exeutility,theSAMcanbeprotectedagainstpassword
crackingattacks.BelowisanextractoftheMicrosoftKBarticleQ143475onsyskey:
“TheWindowsNTServer4.0SystemKeyhotfixprovidesthecapabilitytousestrong
encryptiontechniquestoincreaseprotection ofaccountpasswordinformationstored
intheregistrybytheSecurityAccountM anager(SAM).WindowsNTServerstores
useraccountinformation,includingaderivativeoftheuseraccountpassword,ina
secureportionoftheRegistryprotectedbyaccesscontrolandanobfuscationfunction.
Theaccountinformation intheRegistryisonlyaccessibletomembersofthe
7
http://screamer.mobrien.com/Manuals/MPRM_group/security.htm
Comentarios a estos manuales