00:00:00
okay we can take a look at the next
00:00:02
slide access control but before we do
00:00:05
there is a slide that precedes this Cel
00:00:08
mode now go to this YouTube video and it
00:00:11
has a very learned individual that goes
00:00:14
in the details into details about the
00:00:17
kernel mode and I do recommend everyone
00:00:21
watch it and let's take a look at Access
00:00:23
Control now with this Access Control let
00:00:26
me get the drawing tool we can actually
00:00:28
put the you know what the drawing tool
00:00:31
is like wasn't working correctly there
00:00:33
but okay so we can take the application
00:00:35
layer and then we have everything that
00:00:39
it goes on on the bottom layer such as
00:00:42
the CPU and I can just I can just uh put
00:00:45
in CPU just just to just to abbreviate
00:00:48
everything and the thing that holds
00:00:51
everything together the layer that
00:00:53
connects everything is the kernel so the
00:00:55
kernel is going to connect to the
00:00:57
application layer and the kernel is
00:01:00
going to connect to the CPU layer and
00:01:02
this is all based on the drawing and
00:01:04
this the kernel CPU memory and devices
00:01:08
so the devices would be all the
00:01:10
peripherals so the way I want you to
00:01:12
look at this slide is look at all these
00:01:14
possible things that can go wrong such
00:01:17
as you know John which can utilize the
00:01:22
rocku rocku is a text file you can
00:01:25
Google it that's been going around for
00:01:28
like the last 20 years it has all the
00:01:30
typical passwords if you have ever seen
00:01:32
the movie or the show The Office Michael
00:01:35
the manager his password I think was
00:01:37
password 123 or it was like 1
00:01:41
2345 I recall that there was U somebody
00:01:45
that that was a network manager and and
00:01:47
of course Michael was afraid that he was
00:01:49
some sort of a terrorist or or something
00:01:52
like that anyways we recall that it was
00:01:55
actually Michael that jeopardized the
00:01:57
networking or jeopardized everyone's
00:01:58
Network because it's password was easy
00:02:00
to guess I think it was as I said 1 2 3
00:02:03
4 5 that being said that would have been
00:02:04
one of the passwords that was in the
00:02:07
Rock You Tech so this program called
00:02:10
John actually references anything you
00:02:13
ask it to but it's generally going to be
00:02:16
referencing a file and Rocky was one of
00:02:18
those files that was out there that had
00:02:21
like literally every easy to guess
00:02:23
password that was out there L literally
00:02:25
had thousands of entries so John could
00:02:28
actually utilize a Brute Force attack to
00:02:32
get to this to get to this the whole
00:02:34
point of it is that you're trying to you
00:02:36
know invade one of those user owned
00:02:40
processes to try to get to the kernel
00:02:42
and ultimately get to the bottom layer
00:02:45
the peripherals the CPU and the and all
00:02:47
the RAM and everything another way to do
00:02:50
it is through social engineering and
00:02:52
then of course DNS spoofing and
00:02:54
hijacking and of course the one of the
00:02:57
remedies is to make sure that that your
00:03:00
that your account is US uses duel to
00:03:04
help protect it duel helps you define
00:03:08
you know it helps you Define identity
00:03:12
your to make sure that your identity is
00:03:15
is basically Yours by two things what
00:03:18
you have and what you are for example uh
00:03:20
you can have like an email that they
00:03:23
they email you a particular password to
00:03:26
or your cell phone that's been
00:03:28
pre-assigned and they can text you a
00:03:31
password on your cell phone and that's
00:03:34
that's a the Dual algorithm is something
00:03:38
that adds another layer of protection to
00:03:42
make sure that uh you weren't for
00:03:45
example social engineered now let's take
00:03:47
a look at and let me get out of get out
00:03:50
get out of here let's take a look at the
00:03:52
work groups and active
00:03:54
directory work group is a series of
00:03:58
independent PCS utilizing peer-to-peer
00:04:01
so for example in one land meaning
00:04:04
connected by a local switch you can have
00:04:07
a PC
00:04:08
laptop printer and a couple more PCS as
00:04:12
I said on the same land and this
00:04:15
supports individually attached storage
00:04:19
an example of a good work group in Linux
00:04:21
is Samba and then of course with Windows
00:04:25
you can hook up work groups there and
00:04:28
the scalability is very very low only 10
00:04:31
to 20 devices the whole point of a work
00:04:34
group is you can have printers and PCs
00:04:38
that or excuse me you can have printers
00:04:40
and fax machines and all a work group is
00:04:44
there to do is to potentially share
00:04:47
those uh the printer and file servers to
00:04:51
other people uh the other the other
00:04:54
aspect is active directory which is a
00:04:58
type of domain control controller an
00:05:00
active directory is actually a database
00:05:04
that you can have granular control so
00:05:08
for example if you have a user here I'll
00:05:11
represent that with a box and here you
00:05:14
can have a him the user connected to the
00:05:17
internet and on the Internet is is maybe
00:05:20
Facebook and you can manipulate the
00:05:24
packets going in and out of Facebook
00:05:26
such that you can have granular control
00:05:29
so for example your firewall can be set
00:05:32
up to maybe filter particular types of
00:05:38
traffic like low latency type traffic in
00:05:42
which it would block instant messages on
00:05:45
Facebook and ads so in other words the
00:05:49
worker or the I'm going to say client
00:05:53
can get on your company sponsored
00:05:55
Network he can get to his Facebook so he
00:05:58
can stay connected socially but you're
00:06:00
not going to allow him to engage in
00:06:03
instant messaging and you're going to be
00:06:05
able to prevent the ads because for the
00:06:07
sole purpose not necessarily of
00:06:08
controlling Behavior but for the sole
00:06:11
purpose of saving your company's
00:06:13
bandwidth because all of those instant
00:06:15
messages all those little ads eat up
00:06:18
bandwidth uh PCS in the active directory
00:06:23
directory and you know as I said domain
00:06:26
controller so I'll put DC here for in
00:06:30
controllers they are controlled by the
00:06:33
network administrator so you this would
00:06:36
be the client server type Network so the
00:06:40
control is centralized now with work
00:06:43
groups it is not client server it's
00:06:45
peer-to-peer so you have an individual I
00:06:50
guess decision about whether or not you
00:06:51
want to join in the group active
00:06:53
directory everyone is naturally part of
00:06:57
the group and although you should be in
00:07:00
the same land the scalability of actor
00:07:02
directory is such that it can scale
00:07:05
different autonomous systems completely
00:07:08
different IP addresses and when you when
00:07:12
you do that that's called a federation
00:07:15
so the scalability of domain controllers
00:07:18
and active directory is very high
00:07:21
another interesting fact about active
00:07:24
directory is the fact that you can
00:07:28
anyone
00:07:30
within the domain that the active
00:07:32
directory is connected to uh the
00:07:34
administrator can log into anybody's
00:07:38
computer when they are connected to
00:07:40
active directory so that is yet another
00:07:43
plus let's look at the next slide
00:07:46
Windows attack surfaces and mitigation
00:07:49
so a better way to look at this is here
00:07:54
where is the drawing tool right here
00:07:56
draw and we have our asset right here
00:08:00
whatever whatever it is and maybe it has
00:08:03
some IP so we start from the inside out
00:08:08
the data that resides on it I'll just
00:08:11
say it's a bunch of ones and zeros one
00:08:14
we'll just say 101 that is going to be
00:08:18
encrypted as it resides in this storage
00:08:22
and every piece of communication going
00:08:25
in or out will also be encrypted I'll
00:08:29
just say en NC for encrypted that makes
00:08:33
that makes doubly sure that even if
00:08:36
anybody EES drops on this data with wire
00:08:39
shark and you know they can because we
00:08:41
did a prior lab they're going to get a
00:08:43
bunch of garbage now to even leg have
00:08:48
legit you know access to whatever this
00:08:52
IP is this intellectual property it's
00:08:54
going to have access control so you're
00:08:57
going to have usernames and passwords
00:09:00
and you're going to have authentication
00:09:03
services that or authentication servers
00:09:07
uh outside of the chain of communication
00:09:11
that are is going to be doubly protected
00:09:15
as well and even Above This everything
00:09:19
will be protected by a firewall a
00:09:22
firewall is a specialized appliance that
00:09:27
uh that applies little rules to ensure
00:09:30
and basically it it will impose Access
00:09:34
Control lists to Ure that if you belong
00:09:38
here you can join in but if you don't
00:09:42
belong here then you cannot come in and
00:09:46
this occurs at the packet level and this
00:09:49
occurs inside the packet so we're
00:09:52
looking at quality of service issues so
00:09:56
if it won't necessarily be completely
00:09:58
filled filtered but it'll be as it may
00:10:01
be assigned a uh a priority such that if
00:10:05
there's a tie with a packet with a lower
00:10:09
priority your packet will win an example
00:10:12
of this is voice over IP VoIP which
00:10:15
stands for voice over IP if you're a
00:10:17
voice packet because it requires like
00:10:20
kind of like such care because it
00:10:23
requires low that has such high low
00:10:25
latency requirements that if the voice
00:10:28
packet
00:10:29
is ties with like an FTP packet file
00:10:33
transfer protocol The Voice packet will
00:10:35
for sure be process first because there
00:10:39
is a low latency requirement for that
00:10:43
protocol such that if there's any
00:10:45
minuscule Interruption then that call is
00:10:48
pretty much useless because of the way
00:10:51
voice packets go that being said that
00:10:54
firewall is to protect you and everyone
00:10:57
else in the system all right in terms of
00:11:01
actually installing the Windows Server
00:11:04
maintenance and actually I'm going to
00:11:06
put a line through here simply because
00:11:09
it doesn't have to be just Windows it
00:11:11
could be really any server because this
00:11:14
is a system admin class as syst system
00:11:17
admins you're going to be dealing with
00:11:18
different servers different types of
00:11:20
servers and the idea is you install the
00:11:24
operating system or app software because
00:11:27
you can take any old you know operating
00:11:30
system and install you know an
00:11:32
application on it or you can actually
00:11:34
install server software on it like for
00:11:36
example taking a Windows XP Windows 10
00:11:40
or Windows 11 and and activating the IIs
00:11:44
or installing a pat on it once you do
00:11:46
that guess what it is a web server if
00:11:49
you you so you go ahead and you install
00:11:52
the app or the operating system you
00:11:55
monitor the operation of the computer
00:11:58
system or of the app and then you make
00:12:00
any config changes to the system as
00:12:04
needed so for example if you install
00:12:06
Apache there is a log for Apache it
00:12:10
keeps track of anybody that has logged
00:12:12
in your system it keeps track of their
00:12:14
IP address so you can see if if your
00:12:18
computer was made vulnerable or
00:12:19
exploited you could see the last few
00:12:22
requests that were made you can look at
00:12:24
their IP addresses let's take a look at
00:12:27
system monitoring when it comes to
00:12:29
system monitoring you step one Define
00:12:32
security goals describe Behavior as a
00:12:35
baseline you can have sample performance
00:12:38
information and compare it with the
00:12:40
Baseline and Report any anomalies
00:12:44
finally we have the ability to identify
00:12:48
vulnerabilities so we we already went
00:12:51
over some vulnerabilities like for
00:12:54
example social engineering DNS spoofing
00:12:57
and hijacking so any a lot of servers
00:13:01
are vulnerable to some of the same
00:13:04
things so you can use some of the
00:13:08
research tools that you were provided
00:13:11
you there are websites that you can go
00:13:13
to to check out all possibilities to
00:13:16
check out the surface area
00:13:19
vulnerabilities that this object may
00:13:22
have
00:13:23
[Music]
00:13:29
wa
00:13:32
[Music]
00:13:41
[Music]
00:14:02
[Music]