Chapter 8: 1
Computer Security 3e
Dieter Gollmann
Security.di.unimi.it/sicurezza1314/
Computer Security 3e Dieter Gollmann - - PowerPoint PPT Presentation
Computer Security 3e Dieter Gollmann Security.di.unimi.it/sicurezza1314/ Chapter 8: 1 Chapter 8: Windows Security Chapter 8: 2 Objectives This is not a Windows security crash course. Windows security discussed to show how general
Chapter 8: 1
Security.di.unimi.it/sicurezza1314/
Chapter 8: 2
Chapter 8: 3
Chapter 8: 4
Chapter 8: 5
IPC Manager Security Reference Monitor Memory Manager Process Manager Plug & Play Manager Power Manager
Win32 Subsystem Win32 Application Plug & Play Manager executive services Security Subsystem Active Directory Window Manager I/O Manager File Systems Graphic Device Drivers
Chapter 8: 6
deals with user logon and audit logs
including e.g. passwords (encrypted)
Chapter 8: 7
e.g., to specify that .doc files are handled by Word.
user currently logged on.
the local computer.
the system.
profile used by the local computer at system startup.
Chapter 8: 8
performed at any DC.
Chapter 8: 9
Chapter 8: 10
principal@domain = DOMAIN\principal E.g. diego@europe.microsoft.com = EUROPE\diego
principal = MACHINE\principal diego@europe.microsoft.com = MSRC- 688432\Administrators
Chapter 8: 11
Chapter 8: 12
created when Windows or domain controller is installed
Chapter 8: 13
Chapter 8: 14
created when Windows or domain controller is installed
Chapter 8: 15
Chapter 8: 16
Chapter 8: 17
Chapter 8: 18
Chapter 8: 19
Chapter 8: 20
Chapter 8: 21
Chapter 8: 22
Chapter 8: 23
Chapter 8: 24
Chapter 8: 25
Chapter 8: 26
Chapter 8: 27
Chapter 8: 28
Chapter 8: 29
Diego explorer.exe Diego POWERPNT.exe Diego nmake.exe Diego cmd.exe Diego cl.exe token process
Chapter 8: 30
granular access control.
Chapter 8: 31
Chapter 8: 32
Group or user name SYSTEM Dieter Add Delete Permissions for … Allow Deny Full Control Modify Read & Execute Read Write Special Permission Advanced
Chapter 8: 33
Chapter 8: 34
Chapter 8: 35
Chapter 8: 36
Chapter 8: 37
Chapter 8: 38
the property in ObjectType.
Chapter 8: 39
ACE1 Access mask: create child Type: ACCESS_ALLOWED_OBJECT_ACE InheritedObectType: {GUID for RPC Services} ObjectType {GUID for RPC Endpoint} Trustee (principal SID): Server Applications
Chapter 8: 40
including its principal, stored in its token,
its security descriptor,
mask.
Chapter 8: 41
requested access are obtained;
not all required permissions have been granted).
Chapter 8: 42
Chapter 8: 43
Chapter 8: 44
Chapter 8: 45
Chapter 8: 46
possible to use the identity of a program as a parameter for access-control decisions as well as, or instead of, the identity
since regarded as strange to omit.
Chapter 8: 47
USE_FOR_DENY_ONLY,
Chapter 8: 48
User SID Diego Group SIDs Administrators use for deny only Users Restricted SIDs MyApp Privileges (none)
Ace 1: Access Rights: read, write Principal SID: Diego Ace 2: Access Rights: read Principal SID: MyApp
Chapter 8: 49
User SID Diego Group SIDs Administrators use for deny only Users Restricted SIDs MyApp Privileges (none)
Ace 1: Access Rights: read Principal SID: Admin Ace 2: Access Rights: read Principal SID: MyApp
Chapter 8: 50
User SID Diego Group SIDs Administrators use for deny only Users Restricted SIDs MyApp Privileges (none)
Ace 1: Access Rights: read Principal SID: Admin Ace 2: Access Rights: read Principal SID: MyApp
Chapter 8: 51
User SID Diego Group SIDs Administrators use for deny only Users Restricted SIDs MyApp Privileges (none)
Ace 1: Access Rights: read Principal SID: Diego
Chapter 8: 52
Chapter 8: 53
application, and services.
resources.
Chapter 8: 54
Chapter 8: 55
Chapter 8: 56