Pages

Monday, June 28, 2010

IIS Hardening

IIS Hardening : Given suggestion are only helpful, and applicable on IIS6. These steps are not complete steps.
Microsoft IIS 6.0 Administrator's Pocket Consultant (IT-Administrator's Pocket Consultant)

Reduce the Surface of Attack on the IIS web server
Professional IIS 7
* Enable only "MUST" Windows Server 2003 components and services.
* Enable only "MUST"l IIS 6.0 components and services.
* Enable only "MUST" IIS Web service extensions.
* Configure Windows Server 2003 security settings.


Prevent IIS websites from Unauthorized Access Unauthorised Access: Physical Penetration Testing For IT Security Teams

* Store content on a dedicated disk volume. (other then system drive)
* Set IIS Web site permissions.
* Set IP address and domain name restrictions.
* Set the NTFS file system permissions.


Isolate Web Sites and Applications

1. Evaluate the effects of impersonation on application compatibility:
* Identify the impersonation behavior for ASP applications.
* Select the impersonation behavior for ASP.NET applications.
2. Configure Web sites and applications for isolation.


Configure User Authentication Authentication: From Passwords to Public Keys

1. Assess Web site authentication.
* Select the Web site authentication method.
* Configure the Web site authentication method.
2. Configure File Transfer Protocol (FTP) site authentication.


Encrypt Confidential Data Exchanged with Clients
* Use Secure Sockets Layer (SSL) to encrypt confidential data.
* Use Internet Protocol security (IPsec) or virtual private network (VPN) with remote administration.


Maintain Web Site and Application Security
* Obtain and apply current security patches.
* Enable Windows Server 2003 security logs.
* Enable file access auditing for Web site content.
* Configure IIS logs.
* Review security policies, processes, and procedures.

IIS and SSL

IIS and SSL

IIS support SSL ver 3.0, to encrypt data transfer between client and web server.


Using SSL encryption
DES/3DES/AES/SSL Vpn Encryption/compression
SSL uses a mathematical algorithm for encryption, called a key, to encrypt the data so that it can be recovered by only that key.

Remember, You can't use host header with SSL. With SSL, HTTP requests are encrypted, so host header can't be used to determine correct site to which a request much be routed.


Negotiation

Once requested reaches webServer, the web server sends the public key and server certificate to client browser. Next, client and server negotiate the level of encryption to use for the secure communication try to maintain highest level of encryption possible.

When the encryption level is maintained the client browser creates one session key and uses the server's public key to encrypt this information for transmission. Anyone intercepting the message at this point wont be able to read the SESSION key - Only the server's private key can decrypt the message.

The IIS server decrypts the message sent by the client using its private key. The SSL session between the client and the server is now established. The session key can be used to encrypt and decrypt data transmitted between the client and server.

Level Of Encryption
Whole Disk Encryption Windows - Premium Maint. Renewal 1-24 seat level 1 year 1 seatDatabase Encryption and Key Management for Microsoft SQL Server 2008: Understanding cell-level encryption and Transparent Data Encryption in Microsoft ... modules (Information Security Professionals)
The user's browser and the server use the bit length of their encryption keys to determine the strongest level of encryption possible. If the encryption keys use 512 bits, the level of encryption is set to 40 bits. If the encryption keys use 1024 bits, the level of encryption is set to 128 bits.

Tuesday, June 1, 2010

Crack Unix/Linux password

1. Reboot the linux server
2. On Server boot 'GNU GRUB' Press Enter or any key
3. On 'GNU GRUB' press e
4. it will show many options , choose 'kernal /vm******/ boot method
5. select that , press Enter, Type e press Enter
6. give one space then type single press enter
7. press 'b' to reboot
8. passwd , press enter
9. change password.
10. Use 'reboot' .