Vous êtes sur la page 1sur 14

Challenges in

Securing
Windows

Company
Bobby McConnell
LOGO
Matt Mewborn
WINDOWS SECURITY

 Survival Rate of a
windows machine is
between 30-45
minutes.
 On average Linux is
more secure.
 There is no such thing
as a “secure”
operating system.
Port Scanning
 Hackers Use port
scanners to find open Common Ports
 Well Known Ports (0 - 1023)
ports on systems.  Registered Ports (1024 - 49151)
 Over 1 Billion port  Dynamic and/or Private Ports
(49152 - 65535)
scans are reported
every month.
 Those 1 billion reports
are reported by only a
small portion of
internet users.
IP Spoofing

Five Defenses
IP spoofing occurs  Key Based
when an attacker fakes authentication
their IP address so the  Deny private IP
receiver thinks it is sent addresses
from a location that it is 
Filter inbound/outbound
not actually from.
traffic
 Routers reject packets
outside local network
 Enable encryption
Source Routing

Source routing is an IP option that directs


incoming and outgoing packets.

Results
 Control of network clients
 Control of network servers
 Access to private information
 Malicious actions possible
Man In The Middle
Attacker finds open
Defenses
connections in your
network that causes:  Message Encryption
 Strong encryption
 Clients are at risk authentication
 Privacy is violated
 Session checksums and
shared secrets
 Secure material can be
 File encryption
stolen
DNS Poisoning

Defenses
 Use updated DNS DNS Poisoning is the sending
of falsified DNS to divert traffic
 Separate DNS to the attackers address
instead of the correct one.
Servers
 Restrict Zone
Transfers
 Identify transfer
sources
 Restrict DNS updates
 Restrict DNS service
Password Cracking

Ways To Crack Defense


 Guessing- simply The only defense is a
guess the password strong password such
 Brute Force- try every as: Dit2kuwt6pp!
possible solution
 Dictionary- Use
common words
Password Guidelines

 Minimum length of at
least seven
characters
 Must include both
upper and lower case
characters
 Must include numeric
characters
 Must include
punctuation
Virus

A computer virus is a
malicious program
that generally copies
itself in order to gain
access to other
locations on local
networks.

The best defense is anti-virus software


Trojan Horse

A Trojan Horse is a
program in which
malicious or harmful
code is hidden in
seemingly friendly
software. This in
return gives a hacker
access to your
machine
Worms

A computer worm is
used to: use bandwidth
in a network, deliver a
payload to destroy a
network, or gain access
to email and other data
for personal gain.
Defenses for Windows

 Firewall
 Anti-Virus software
 Virtual Private
Networks (VPN)
 Anti-Spyware
software
 Strong passwords
 Informed Users
Credits

All information used in this presentation is provided from the paper


“Challenges in Securing Windows” by: Bobby McConnel & Matt Mewborn
All outside sources are cited in that paper.