ݺߣ

ݺߣShare a Scribd company logo
Ломать - не строить!
Юрий Гольцев
@ygoltsev
Intro
Invest in your knowledge of practical information security
Please, don’t order a penetration test until…
My own TOP of security issues, related to internal networks:
1. Weak password policy
2. Default accounts
3. Local accounts/unnecessary privileges
4. Windows architecture
5. WPAD configuration mismatch
6. Antivirus software configuration mismatch
7. No network segmentation
8. No patch management
Weak password policy
Description
Easy to bruteforce
Common Targets
Directory Service (Active Directory/Lotus Domino/LDAP/Novell/etc)
Recommendations
Implement strong password policy, just follow next rules:
- 8 chars (at least)
-Lower, upper case
-Alpha-Numeric
Check for common passwords once a day (at least)
- Special chars
- Change every 60 days
Default accounts
Description
Easy to bruteforce
Common Targets
DBs, network devices (routers/printers/etc)
Recommendations
-Disable all unused accounts
-Set strong password
Local accounts/unnecessary privileges
Description
Local administrator accounts/privileges – is bad
Common Targets
Windows hosts
Recommendations
-Disable accounts of local administrators on Windows hosts
-Do not use GP to manage accounts of local administrators on Windows hosts
Windows architecture
Description
You can’t prevent it, if you use it
Common Targets
Windows hosts
Recommendations
-Follow principle of minimal privileges
-Use privileged accounts for administration tasks only
-Implement two factor authentication for privileged accounts
-Implement patch management
WPAD configuration mismatch
Description
Very useful for corporate users if implemented, and for attacker – if not
Common Targets
Windows hosts
Recommendations
Disable WPAD (Web Proxy Auto Discovery) feature if it is not implemented
Antivirus software configuration mismatch
Description
Antivirus software can be disable with local admin privileges
Common Targets
Windows hosts
Recommendations
Configure self defense feature of antivirus software
No network segmentation
Description
No restrictions and no data filtration on network level
Common Targets
Network topology
Recommendations
Implement data filtration – it is better to use white lists for access
No patch management
Description
MS08-067 still can be found during penetration test
Common Targets
Windows/Unix hosts
Recommendations
Implement patch management
Outro

More Related Content

Similar to Goltsev Yuriy - Ломать - не строить! (20)

Illuminate - Performance Analystics driven by Machine Learning
Illuminate - Performance Analystics driven by Machine LearningIlluminate - Performance Analystics driven by Machine Learning
Illuminate - Performance Analystics driven by Machine Learning
jClarity
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
The Infosec Revival
The Infosec RevivalThe Infosec Revival
The Infosec Revival
scriptjunkie
IBM Connections Adminblast
IBM Connections AdminblastIBM Connections Adminblast
IBM Connections Adminblast
LetsConnect
Webinar: IBM Connections Adminblast
Webinar: IBM Connections AdminblastWebinar: IBM Connections Adminblast
Webinar: IBM Connections Adminblast
Nico Meisenzahl
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Cyber Security Alliance
We4IT lcty 2013 - keynote - worst practices - the best of the worst
We4IT lcty 2013 - keynote - worst practices - the best of the worstWe4IT lcty 2013 - keynote - worst practices - the best of the worst
We4IT lcty 2013 - keynote - worst practices - the best of the worst
We4IT Group
Social Connections 12 - IBM Connections Adminblast
Social Connections 12 - IBM Connections AdminblastSocial Connections 12 - IBM Connections Adminblast
Social Connections 12 - IBM Connections Adminblast
Nico Meisenzahl
IBM Connections Adminblast - Soccnx 12 Edition
IBM Connections Adminblast - Soccnx 12 EditionIBM Connections Adminblast - Soccnx 12 Edition
IBM Connections Adminblast - Soccnx 12 Edition
panagenda
Dns firewalls null-may2020
Dns firewalls null-may2020Dns firewalls null-may2020
Dns firewalls null-may2020
n|u - The Open Security Community
Webinar: IBM Connections Adminblast
Webinar: IBM Connections AdminblastWebinar: IBM Connections Adminblast
Webinar: IBM Connections Adminblast
panagenda
Nightmares of a Penetration Tester ( How to protect your network)
Nightmares of a Penetration Tester ( How to protect your network)Nightmares of a Penetration Tester ( How to protect your network)
Nightmares of a Penetration Tester ( How to protect your network)
Chris Nickerson
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux AdministratorsProper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Dave Stokes
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne
ITARC15 Workshop - Architecting a Large Software Project - Lessons Learned
ITARC15 Workshop - Architecting a Large Software Project - Lessons LearnedITARC15 Workshop - Architecting a Large Software Project - Lessons Learned
ITARC15 Workshop - Architecting a Large Software Project - Lessons Learned
João Pedro Martins
Flipping the script
Flipping the scriptFlipping the script
Flipping the script
Chris Nickerson
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...
The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...
The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...
Dave Stokes
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
edavid2685
Illuminate - Performance Analystics driven by Machine Learning
Illuminate - Performance Analystics driven by Machine LearningIlluminate - Performance Analystics driven by Machine Learning
Illuminate - Performance Analystics driven by Machine Learning
jClarity
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
IBM Connections Adminblast
IBM Connections AdminblastIBM Connections Adminblast
IBM Connections Adminblast
LetsConnect
Webinar: IBM Connections Adminblast
Webinar: IBM Connections AdminblastWebinar: IBM Connections Adminblast
Webinar: IBM Connections Adminblast
Nico Meisenzahl
We4IT lcty 2013 - keynote - worst practices - the best of the worst
We4IT lcty 2013 - keynote - worst practices - the best of the worstWe4IT lcty 2013 - keynote - worst practices - the best of the worst
We4IT lcty 2013 - keynote - worst practices - the best of the worst
We4IT Group
Social Connections 12 - IBM Connections Adminblast
Social Connections 12 - IBM Connections AdminblastSocial Connections 12 - IBM Connections Adminblast
Social Connections 12 - IBM Connections Adminblast
Nico Meisenzahl
IBM Connections Adminblast - Soccnx 12 Edition
IBM Connections Adminblast - Soccnx 12 EditionIBM Connections Adminblast - Soccnx 12 Edition
IBM Connections Adminblast - Soccnx 12 Edition
panagenda
Webinar: IBM Connections Adminblast
Webinar: IBM Connections AdminblastWebinar: IBM Connections Adminblast
Webinar: IBM Connections Adminblast
panagenda
Nightmares of a Penetration Tester ( How to protect your network)
Nightmares of a Penetration Tester ( How to protect your network)Nightmares of a Penetration Tester ( How to protect your network)
Nightmares of a Penetration Tester ( How to protect your network)
Chris Nickerson
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux AdministratorsProper Care and Feeding of a MySQL Database for Busy Linux Administrators
Proper Care and Feeding of a MySQL Database for Busy Linux Administrators
Dave Stokes
Ch 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS VulnerabilitesCh 8: Desktop and Server OS Vulnerabilites
Ch 8: Desktop and Server OS Vulnerabilites
Sam Bowne
ITARC15 Workshop - Architecting a Large Software Project - Lessons Learned
ITARC15 Workshop - Architecting a Large Software Project - Lessons LearnedITARC15 Workshop - Architecting a Large Software Project - Lessons Learned
ITARC15 Workshop - Architecting a Large Software Project - Lessons Learned
João Pedro Martins
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...
The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...
The Proper Care and Feeding of a MySQL Database for Busy Linux Admins -- SCaL...
Dave Stokes
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
edavid2685

More from Defcon Moscow (12)

Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow
Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"
Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"
Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"
Defcon Moscow
Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"
Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"
Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"
Defcon Moscow
Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"
Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"
Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"
Defcon Moscow
Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...
Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...
Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...
Defcon Moscow
Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"
Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"
Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"
Defcon Moscow
Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"
Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"
Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"
Defcon Moscow
Defcon Moscow #9 - Mikhail Elizarov "MITM"
Defcon Moscow #9 - Mikhail Elizarov "MITM"Defcon Moscow #9 - Mikhail Elizarov "MITM"
Defcon Moscow #9 - Mikhail Elizarov "MITM"
Defcon Moscow
Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...
Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...
Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...
Defcon Moscow
Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"
Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"
Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"
Defcon Moscow
Defcon Moscow #9 - Sergey Vishnyakov
Defcon Moscow #9 - Sergey VishnyakovDefcon Moscow #9 - Sergey Vishnyakov
Defcon Moscow #9 - Sergey Vishnyakov
Defcon Moscow
Denis Makrushin & Maria Garnaeva - DeanonymizaTOR
Denis Makrushin & Maria Garnaeva - DeanonymizaTORDenis Makrushin & Maria Garnaeva - DeanonymizaTOR
Denis Makrushin & Maria Garnaeva - DeanonymizaTOR
Defcon Moscow
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Defcon Moscow
Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"
Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"
Defcon Moscow #0x0A - Mikhail Firstov "Hacking routers as Web Hacker"
Defcon Moscow
Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"
Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"
Defcon Moscow #0x0A - Dmitry Nedospasov "WTFPGA?!"
Defcon Moscow
Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"
Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"
Defcon Moscow #0x0A - Nikita Kislitsin APT "Advanced Persistent Threats"
Defcon Moscow
Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...
Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...
Defcon Moscow #0x0A - Sergey Golovanov "Вредоносные программы для финансовых ...
Defcon Moscow
Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"
Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"
Defcon Moscow #0x0A - Dmitry Evteev "Pentest vs. APT"
Defcon Moscow
Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"
Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"
Defcon Moscow #9 - Oleg Kupreev "Telecommunication Hardware Vulnerabilities"
Defcon Moscow
Defcon Moscow #9 - Mikhail Elizarov "MITM"
Defcon Moscow #9 - Mikhail Elizarov "MITM"Defcon Moscow #9 - Mikhail Elizarov "MITM"
Defcon Moscow #9 - Mikhail Elizarov "MITM"
Defcon Moscow
Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...
Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...
Defcon Moscow #9 - Timur Yunusov "Особенности проведения социотехнического те...
Defcon Moscow
Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"
Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"
Defcon Moscow #9 - Ivan Novikov "ElasticSearch is secure?"
Defcon Moscow
Defcon Moscow #9 - Sergey Vishnyakov
Defcon Moscow #9 - Sergey VishnyakovDefcon Moscow #9 - Sergey Vishnyakov
Defcon Moscow #9 - Sergey Vishnyakov
Defcon Moscow
Denis Makrushin & Maria Garnaeva - DeanonymizaTOR
Denis Makrushin & Maria Garnaeva - DeanonymizaTORDenis Makrushin & Maria Garnaeva - DeanonymizaTOR
Denis Makrushin & Maria Garnaeva - DeanonymizaTOR
Defcon Moscow

Recently uploaded (20)

Research & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptxResearch & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptx
Dr. Sarita Anand
MELC: Follows ethical standards in writing related literature
MELC: Follows ethical standards in writing related literatureMELC: Follows ethical standards in writing related literature
MELC: Follows ethical standards in writing related literature
joverlynbalansag1
Azure Data Engineer Interview Questions By ScholarHat
Azure Data Engineer Interview Questions By ScholarHatAzure Data Engineer Interview Questions By ScholarHat
Azure Data Engineer Interview Questions By ScholarHat
Scholarhat
How to Setup WhatsApp in Odoo 17 - Odoo ݺߣs
How to Setup WhatsApp in Odoo 17 - Odoo ݺߣsHow to Setup WhatsApp in Odoo 17 - Odoo ݺߣs
How to Setup WhatsApp in Odoo 17 - Odoo ݺߣs
Celine George
Managing expiration dates of products in odoo
Managing expiration dates of products in odooManaging expiration dates of products in odoo
Managing expiration dates of products in odoo
Celine George
PUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health HistoryPUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health History
Jonathan Hallett
How to Configure Proforma Invoice in Odoo 18 Sales
How to Configure Proforma Invoice in Odoo 18 SalesHow to Configure Proforma Invoice in Odoo 18 Sales
How to Configure Proforma Invoice in Odoo 18 Sales
Celine George
ITI Turner Question Paper MCQ E-Book Free Download
ITI Turner Question Paper MCQ E-Book Free DownloadITI Turner Question Paper MCQ E-Book Free Download
ITI Turner Question Paper MCQ E-Book Free Download
SONU HEETSON
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdfBlind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Ajaz Hussain
DBMS Interview Questions PDF By ScholarHat
DBMS Interview Questions PDF By ScholarHatDBMS Interview Questions PDF By ScholarHat
DBMS Interview Questions PDF By ScholarHat
Scholarhat
Final-PPT-on-Reading-Comprehension-in-the-Early-Years.pptx
Final-PPT-on-Reading-Comprehension-in-the-Early-Years.pptxFinal-PPT-on-Reading-Comprehension-in-the-Early-Years.pptx
Final-PPT-on-Reading-Comprehension-in-the-Early-Years.pptx
jennifersayong3
Intellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptxIntellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptx
NidhiSharma495177
ASP.NET Interview Questions PDF By ScholarHat
ASP.NET  Interview Questions PDF By ScholarHatASP.NET  Interview Questions PDF By ScholarHat
ASP.NET Interview Questions PDF By ScholarHat
Scholarhat
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAHBISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
coacharyasetiyaki
Meeting the needs of modern students?, Selina McCoy
Meeting the needs of modern students?, Selina McCoyMeeting the needs of modern students?, Selina McCoy
Meeting the needs of modern students?, Selina McCoy
Economic and Social Research Institute
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
ASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By ScholarhatASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By Scholarhat
Scholarhat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHatFull-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Scholarhat
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
preetheshparmar
Entity Framework Interview Questions PDF By ScholarHat
Entity Framework Interview Questions PDF By ScholarHatEntity Framework Interview Questions PDF By ScholarHat
Entity Framework Interview Questions PDF By ScholarHat
Scholarhat
Research & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptxResearch & Research Methods: Basic Concepts and Types.pptx
Research & Research Methods: Basic Concepts and Types.pptx
Dr. Sarita Anand
MELC: Follows ethical standards in writing related literature
MELC: Follows ethical standards in writing related literatureMELC: Follows ethical standards in writing related literature
MELC: Follows ethical standards in writing related literature
joverlynbalansag1
Azure Data Engineer Interview Questions By ScholarHat
Azure Data Engineer Interview Questions By ScholarHatAzure Data Engineer Interview Questions By ScholarHat
Azure Data Engineer Interview Questions By ScholarHat
Scholarhat
How to Setup WhatsApp in Odoo 17 - Odoo ݺߣs
How to Setup WhatsApp in Odoo 17 - Odoo ݺߣsHow to Setup WhatsApp in Odoo 17 - Odoo ݺߣs
How to Setup WhatsApp in Odoo 17 - Odoo ݺߣs
Celine George
Managing expiration dates of products in odoo
Managing expiration dates of products in odooManaging expiration dates of products in odoo
Managing expiration dates of products in odoo
Celine George
PUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health HistoryPUBH1000 - Module 2: Public Health History
PUBH1000 - Module 2: Public Health History
Jonathan Hallett
How to Configure Proforma Invoice in Odoo 18 Sales
How to Configure Proforma Invoice in Odoo 18 SalesHow to Configure Proforma Invoice in Odoo 18 Sales
How to Configure Proforma Invoice in Odoo 18 Sales
Celine George
ITI Turner Question Paper MCQ E-Book Free Download
ITI Turner Question Paper MCQ E-Book Free DownloadITI Turner Question Paper MCQ E-Book Free Download
ITI Turner Question Paper MCQ E-Book Free Download
SONU HEETSON
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdfBlind spots in AI and Formulation Science, IFPAC 2025.pdf
Blind spots in AI and Formulation Science, IFPAC 2025.pdf
Ajaz Hussain
DBMS Interview Questions PDF By ScholarHat
DBMS Interview Questions PDF By ScholarHatDBMS Interview Questions PDF By ScholarHat
DBMS Interview Questions PDF By ScholarHat
Scholarhat
Final-PPT-on-Reading-Comprehension-in-the-Early-Years.pptx
Final-PPT-on-Reading-Comprehension-in-the-Early-Years.pptxFinal-PPT-on-Reading-Comprehension-in-the-Early-Years.pptx
Final-PPT-on-Reading-Comprehension-in-the-Early-Years.pptx
jennifersayong3
Intellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptxIntellectual Honesty & Research Integrity.pptx
Intellectual Honesty & Research Integrity.pptx
NidhiSharma495177
ASP.NET Interview Questions PDF By ScholarHat
ASP.NET  Interview Questions PDF By ScholarHatASP.NET  Interview Questions PDF By ScholarHat
ASP.NET Interview Questions PDF By ScholarHat
Scholarhat
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAHBISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
BISNIS BERKAH BERANGKAT KE MEKKAH ISTIKMAL SYARIAH
coacharyasetiyaki
cervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdfcervical spine mobilization manual therapy .pdf
cervical spine mobilization manual therapy .pdf
SamarHosni3
ASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By ScholarhatASP.NET Web API Interview Questions By Scholarhat
ASP.NET Web API Interview Questions By Scholarhat
Scholarhat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHatFull-Stack .NET Developer Interview Questions PDF By ScholarHat
Full-Stack .NET Developer Interview Questions PDF By ScholarHat
Scholarhat
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklk
lklklklklklklklklklklklklklklklklklklklklklklklklklklklk
preetheshparmar
Entity Framework Interview Questions PDF By ScholarHat
Entity Framework Interview Questions PDF By ScholarHatEntity Framework Interview Questions PDF By ScholarHat
Entity Framework Interview Questions PDF By ScholarHat
Scholarhat

Goltsev Yuriy - Ломать - не строить!

  • 1. Ломать - не строить! Юрий Гольцев @ygoltsev
  • 3. Invest in your knowledge of practical information security
  • 4. Please, don’t order a penetration test until…
  • 5. My own TOP of security issues, related to internal networks: 1. Weak password policy 2. Default accounts 3. Local accounts/unnecessary privileges 4. Windows architecture 5. WPAD configuration mismatch 6. Antivirus software configuration mismatch 7. No network segmentation 8. No patch management
  • 6. Weak password policy Description Easy to bruteforce Common Targets Directory Service (Active Directory/Lotus Domino/LDAP/Novell/etc) Recommendations Implement strong password policy, just follow next rules: - 8 chars (at least) -Lower, upper case -Alpha-Numeric Check for common passwords once a day (at least) - Special chars - Change every 60 days
  • 7. Default accounts Description Easy to bruteforce Common Targets DBs, network devices (routers/printers/etc) Recommendations -Disable all unused accounts -Set strong password
  • 8. Local accounts/unnecessary privileges Description Local administrator accounts/privileges – is bad Common Targets Windows hosts Recommendations -Disable accounts of local administrators on Windows hosts -Do not use GP to manage accounts of local administrators on Windows hosts
  • 9. Windows architecture Description You can’t prevent it, if you use it Common Targets Windows hosts Recommendations -Follow principle of minimal privileges -Use privileged accounts for administration tasks only -Implement two factor authentication for privileged accounts -Implement patch management
  • 10. WPAD configuration mismatch Description Very useful for corporate users if implemented, and for attacker – if not Common Targets Windows hosts Recommendations Disable WPAD (Web Proxy Auto Discovery) feature if it is not implemented
  • 11. Antivirus software configuration mismatch Description Antivirus software can be disable with local admin privileges Common Targets Windows hosts Recommendations Configure self defense feature of antivirus software
  • 12. No network segmentation Description No restrictions and no data filtration on network level Common Targets Network topology Recommendations Implement data filtration – it is better to use white lists for access
  • 13. No patch management Description MS08-067 still can be found during penetration test Common Targets Windows/Unix hosts Recommendations Implement patch management
  • 14. Outro