Too many SIDs in access token

Download Report

Transcript Too many SIDs in access token

Bezpečnost Windows pro
pokročilé: zajímavosti a UAC
Ing. Ondřej Ševeček | GOPAS a.s. |
MCM:Directory | MVP:Enterprise Security | CEH: Certified Ethical Hacker |
CHFI: Computer Hacking Forensic Investigator
[email protected] | www.sevecek.com |
GOPAS: info@gopas,cz | www.gopas.cz | www.facebook.com/P.S.GOPAS
Specialties and demos
Advanced Windows Security
Too many SIDs in access token
 Access token can accumulate only up to 1025
 More than that, user cannot log on
• cannot create the access token
• 0xC000015A = STATUS_TOO_MANY_CONTEXT_IDS
 But the Account Logon Event will appear on DC as
Kerberos authentication works fine
Translating SIDs in PowerShell
'S-1-5-18', 'S-1-5-32-544' | Select @{ n = 'SID' ; e = { $_ } }, @{
n = 'Name' ; e = { (New-Object
System.Security.Principal.SecurityIdentifier
$_).Translate([System.Type]::GetType('System.Security.Principal.NTA
ccount')).Value } }
'Administrators', 'NT AUTHORITY\Network Service' | Select @{ n =
'Name' ; e = { $_ } }, @{ n = 'SID' ; e = { (New-Object
Security.Principal.NTAccount
$_).Translate([Security.Principal.SecurityIdentifier]).Value } }
$rxSID = '[Ss]-1(?:-\d+){1,}'
[regex]::Match('This SID S-1-5-80-3964583643-2633443559-28344389353739664028-1580655619 has been detected', $rxSID).Value
Deleted domain user accounts
 AD LDAP replication requires tombstone technology
 All deleted objects remain in the database
• tombstone lifetime
• 60/180/360 days or anything configured manually
 SID, samAccountName
Enumerating all users and groups in
PowerShell
(1..10000) | % { "S-1-5-21-2533895723-4202532492-454630010-$_" } |
Select @{ n = 'SID' ; e = { $_ } }, @{ n = 'Name' ; e = { (NewObject System.Security.Principal.SecurityIdentifier
$_).Translate([System.Type]::GetType('System.Security.Principal.NTA
ccount')).Value } } | ? { $_.Name -ne $null }
Example IIS app pool identity
 Running IIS application pool under Network Service
enables it to receive authenticated traffic from
network
 It also allows it to access network authenticated as
the computer domain account
 Running IIS application pool under Local Service
prevents remote access
User Account Control
Advanced Windows Security
Restricted Users
 Users often work as local Administrators
• users on workstations/notebooks
• local administrators on servers
 We may want restrict their default permissions and
rights
• allow them to elevate if required
 Does not apply for remote (network) connections
UAC Options on Windows 7
UAC Options on Windows 8
 Only display settings
 You must use the policy
Restricting Local Administrators
 Windows XP and newer can restrict local
Administrators
• enforced by default on Windows Vista+
• must use Run As on Windows XP
 LSASS can issue restricted access token
• Administrators and Domain Admins groups are marked as
Deny
• Only basic user rights enabled
 LSASS maintains two separate Kerberos ticket
caches
“Deny” Groups in Access Token
 User is not member of the group for Allow ACEs
• if something is granted to the group, it does not apply
 User is member of the group for Deny ACEs
• if something is explicitly denied to the group, it still applies
• not a common case for Administrators, but still good to know

Deny Group in Access Token
UAC on Windows XP and 2003
Děkuji za pozornost
Ing. Ondřej Ševeček | GOPAS a.s. |
MCM:Directory | MVP:Enterprise Security | CEH: Certified Ethical Hacker |
CHFI: Computer Hacking Forensic Investigator
[email protected] | www.sevecek.com |
GOPAS: info@gopas,cz | www.gopas.cz | www.facebook.com/P.S.GOPAS