Windows Server 2003 Security Configuration Battle Exercise

xiaoxiao2021-03-05  25

Windows Server2003 is currently the most mature network server platform, which is much greatly improved relative to Windows 2000, but 2003 default security configuration is not necessarily suitable for our needs, so we have to fully configure Win2003 based on the actual situation. To be honest, the security configuration is a relatively difficult network technology, the permission configuration is too strict, and many programs are still can't afford, the authority is too loose, and it is easy to be invaded by hackers, as a network administrator, really very Headache, therefore, I combine network security management experience in these years, summarizing the following methods to improve our server security.

First trick: Correctly divided the file system format, select a stable operating system installation disk

In order to improve security, the server's file system format must be divided into NTFS (new technical file system) format, which is much higher than FAT16, FAT32 security, and the space utilization is greatly improved, we can configure file security through it. , Disk quota, EPS file encryption, etc. If you have been divided into FAT32 format, you can convert FAT32 into NTFS format with CONVERT disk / fs: ntfs / v. Install Windows 2003 Server, in the Netan League http://cqhk.14023.com/soft/yyrj/bigsoft/200504/502.asp> Enterprise with Windows 2003 can upgrade, this completely crack version, you can Direct online upgrade, we try to install the components we must use when we installed, and then put on the latest patches and upgrade to the latest version online! Ensure that the operating system itself has no vulnerability.

The second trick: Correctly set the security of the disk, as follows (the security settings of the virtual machine, we take the ASP program as an example):

1, system disk authority settings

C: Partition section:

C: /

ADMINISTRATORS is all (this folder, subfolders and files)

Creator Owner  all (only subfolds and files)

System all (this folder, subfolders and files)

IIS_WPG creates file / write data (only this folder)

IIS_WPG (This folder, subfolders and files)

Traverse folder / run file

List folder / read data

Read attribute

Create a folder / additional data

Read permissions

C: / Documents and Settings

ADMINISTRATORS is all (this folder, subfolders and files)

Power Users (this folder, subfolders and files)

Reading and running

List the folder directory

Read

System all (this folder, subfolders and files)

C: / program files

ADMINISTRATORS is all (this folder, subfolders and files)

Creator Owner is all (only subfolds and files)

IIS_WPG (This folder, subfolders and files)

Reading and running

List the folder directory

Read

Power Users (this folder, subfolders and files)

Modify permissions

System all (this folder, subfolders and files)

Terminal Server User (This folder, subfolders and files)

Modify permissions

2, website and virtual machine permission settings (such as website in E disk)

Description: We assume that the website is all in the E disk wwwsite directory and creates a guest user for each virtual machine. The username is vhost1 ... vhostn and creates a Webuser group, add all the VHOST users to this Webuser group. Convenient management inside

E: /

ADMINISTRATORS is all (this folder, subfolders and files)

E: / wwwsite

All (this folder, subfolder, file) system is all (this folder, subfolder, file)

Service is all (this folder, subfolders and files)

E: / wwwsite / vhost1

ADMINISTRATORS is all (this folder, subfolders and files)

System all (this folder, subfolders and files)

Vhost1 is all (this folder, subfolders and files)

3, data backup disk

The data backup disk is best to specify only a specific user who has full operations.

For example, the F disk is a data backup disk, we only specify an administrator who has permissions on it.

4, permission settings in other places

Please find these files in the C drive, put the security settings with only a specific administrator has full operation permission

These files only allow administrators to access

Net.exe

Net1.exet

cmd.exe

TFTP.exe

NetStat.exe

Regedit.exe

at.exe

Attrib.exe

Cacls.exe

Format.com

5. Delete the c: / inetpub directory, delete IIS unnecessary mappings, establish a trap account, change the description

Third stroke: Disabling unnecessary services, improve security and system efficiency

Computer Browser maintains the latest list of computers on the network and provides this list

Task Scheduler allows the program to run at the specified time

Ruting and Remote Access provides routing services for companies in the LAN and WAN environment

Removable Storage manages removable media, drivers and libraries

Remote Registry Service allows remote registry operations

Print Spooler loads files into memory for later printing. Users who want to use printers cannot disable this

IPsec Policy Agent Management IP Security Policy and Starting Isakmp / Oakleyike) and IP Security Drivers

Distributed Link Tracking Client Sends a notification when the file moves in the NTFS volume of the network domain

Comcom Event System provides automatic release to subscription COM components

Alerter notifies the selected user and computer management alert

Error Reporting Service Collection, Storage, and to Microsoft Report Abnormal Applications

Messenger Transports NET SEND and Alert Service Messages between Clients and Services

Telnet allows remote users to log in to this computer and run programs

The fourth stroke: modify the registry, let the system stronger

1. Hide Important Files / Directory You can modify the registry to implement complete hide: hkey_local_machine / current-version / explorer / advanced / folder / hi-dden / showall, the mouse right-click "CheckedValue", select the modification, Change the value from 1 to 0

2, start the system's own Internet connection _BLANK "> Firewall, check the web server in the Settings service option.

3 to prevent SYN flood attacks

HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / Services / TCPIP / Parameters

New DWORD value, named SYNATTACKPROTECT, value 2

Enablepmtudiscovery Reg_dword 0

NonameReleaseOndemand Reg_dword 1

Enabledeadgwdetect reg_dword 0

KeepaliveTime Reg_dword 300,000

PerformRouterdiscovery Reg_dword 0

EnableICMPRedirects reg_dword 04. Prohibited response ICMP routing packet

HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / TCPIP / Parameters / Interfaces / Interface

New DWORD value, named PerformRouterDiscovery value is 0

5. Prevent ICMP to redirect the attack

HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / Services / TCPIP / Parameters

Set the enableICMPRedirects value to 0

6. IGMP protocol does not support

HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / Services / TCPIP / Parameters

New DWORD value, named IGMplevel value 0

7. Modify the terminal service port

Running regedit, find [HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / CONTROL / TERMINAL Server / WDS / RDPWD / TDS / TCP] to see the portnumber on the right? Change it to the port number you want under decimal state, such as 7126, as long as you do not conflict with other conflicts.

2, the second hkey_local_machine / system / currentcontrolset / control / terminal server / winstations / rdp-TCP, the method is the same as that, the changed port number is the same as the above.

8, prohibiting IPC empty connection:

Cracker can use the NET USE command to create an empty connection, in turn, and Net View, NBTSTAT These are air-based, and if the empty connection is forbidden. Open the registry, find local_machine / system / currentcontrolset / control / lsa-restrictanonymous to change this value to "1".

9, change the TTL value

  Cracker can roughly judge your operating system based on the TTL value of ping back, such as:

TTL = 107 (WinNT);

TTL = 108 (Win2000);

TTL = 127 or 128 (Win9x);

TTL = 240 or 241 (Linux);

TTL = 252 (Solaris);

TTL = 240 (IRIX);

In fact, you can change it yourself: hkey_local_machine / system / currentcontrolset / services / tcpip / parameters: defaultttl reg_dword 0-0xff (0-255 decimal, default 128) change into a inexplicable number such as 258, at least let those small vegetables In the first half of the day, I don't have to give up the invasion.

10. Delete the default sharing

 Someone asked me to share all trays, change it back, and the restart becomes a sharing. This is the default share set by 2K. You must cancel it by modifying the registry: hkey_local_machine / System / currentControlSet / Services / lanmanserver / parameters: AutoShareserver type is REG_DWORD to change the value to 0

11. Prohibition of establishing an empty connection

By default, any user enumerates an account by empty connection, and speculates the password. We can ban the establishment of an empty connection by modifying the registry:

The value of local_machine / system / currentcontrolset / control / lsa-restrictanonymous is changed to "1". Fifth stroke: other safety means

1. Disable NetBIOS on TCP / IP

 Online Neighborhood - Properties - Local Connection - Properties -InetNet Protocol (TCP / IP) Properties - Advanced-Wins Panel -NetBIOS Settings - Disable NetBIOS on TCP / IP. This cracker cannot read your NetBIOS information and NIC MAC address with the nbtstat command.

2. Account security

 First, all accounts are prohibited, except yourself, huh, huh. Then change the administrator. I have built an administrator account, but what is the kind of permissions, and then open a notepad, a mess, copy, paste it into the "password", huh, huh, come to break the password ~! After breaking it, I found a low-level account. I don't see you crash?

Create 2 administrators with account

Although this is a bit contradictory, it is in fact to obey the rules of the above. Create a general permissions account to recruit and handle some * standby, another account with Administrators permission is only used when needed. Allows administrators using the "runas" command to perform some work that require privileges to make it easy to manage

3. Change C: /Windows/help/iishelp/common/404b.htm content change to This error is automatically transferred to the home page

4. Safety log

  I have encountered such a situation, a host is invaded by others, the system administrator invited me to trace the murderer, I log in to see: The safety log is empty, inverted, keep: Win2000 default installation is Do not open any safety review! Then please go to the local security policy -> In the audit strategy to open the corresponding audit, the recommended audit is:

Account management success failed

Successful failure

Object Access failed

Strategy change successfully failed

Privilege failure

System event success failure

Directory Service Access Failure

Account login event success failure

The shortcomings of reviewing projects are that if you want to see that there is no record, it is not a matter of nothing; the audit project will not only take up system resources, but will cause you to see it at all, this will lose the significance of review.

5. Run Anti-Virgin

I have never seen the installation of anti-virus software, in fact, this is very important. Some good anti-virus software can not only kill some famous viruses, but also kill a large number of Trojans and backdoor programs. In this case, the famous Trojans used by the "hacker" are unused. Don't forget to upgrade the virus library, we recommend McAfree anti-virus software Blackice_blank "> Firewall

6. SQLSERVER Database Server Security and Serv-U FTP Server Security Configuration, Change the default port, and manage your password

7. Set IP filtering, disable Trojan common port with Blackice

Generally disable the following ports

135 138 139 443 445 4000 4899 7626

8. The settings for local security policies and group policies If you set it wrong when you set up a local security policy, you can restore it into its default value.

Open the% SystemRoot% / Security folder, create a "OldSecurity" subdirectory, move all the .log files under the% systemroot% / security to this new subfolder.

Find the "SECEDIT.SDB" secure database in% systemroot% / security / data / to change the name, such as "SECEDIT.OLD". Start "Security Configuration and Analysis" MMC Management Unit: "Start" -> " "->" MMC ", start management console," Add / Delete Management Unit ", add" Safety Configuration and Analysis "management unit.

Right-click Security Configuration and Analysis -> "Open Database", browse the "C: / WinNT / Security / Database" folder, enter the file name "SECEDIT.SDB", click "Open".

When the system prompts to enter a template, select "Setup Security.inf", click "Open".

If the system prompts "Rejecting the Database", no matter what him.

You will find a new secure database in the "C: / Winnt / Security / Database" subfolder, re-generate the log file under the "C: / WinNT / Security" subfolder. The secure database is successful.

转载请注明原文地址:https://www.9cbs.com/read-36963.html

New Post(0)