Global Information Assurance Certification Paper - GIAC ...

Page created by Rita Clarke
 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
GIAC Level One Security Essentials Practical Assignment
           NetBIOS and File Sharing Security in Windows

                                                                                            s.
                                                                                         ht
           Mark Wade

                                                                                     rig
                                                                                 ull
           Version 1.2f – August 13, 2001

                                                                                  f
                                                                               ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                            tai
                                                                         re
                Understanding NetBIOS..................................................... 2

                                                                     or
                Figure One: NetBIOS Over IP............................................ 2

                                                                  th
                NetBIOS Names ................................................................ 3
                                                              Au
                Am I at Risk?..................................................................... 4
                                                           2,

                Scope ID ........................................................................... 6
                                                       00

                Fact VS Fiction.................................................................. 6
                                                    -2

                Conclusion ........................................................................ 7
                                                00

                References and Works Cited............................................... 8
                                             20
                                         te
                                       tu
                                    sti
                                 In
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002             As part of GIAC practical repository.              Author retains full rights.
Overview

                   NetBIOS (Network Basic Input/Output System) is a program that allows different
           computers on the same local area network to communicate. NetBIOS frees these
           computers’ applications from having to know the intricacies of the network and provides

                                                                                          s.
           a means off creating a session between the two PCs. NetBIOS is not a protocol. This is

                                                                                       ht
           a common mistake since NetBIOS does have base rules. For example, NetBIOS

                                                                                   rig
           contains standard rules when involved in the naming of computers, workgroups,
           domains, users and other services utilizing NetBIOS.

                                                                               ull
                   The NetBIOS interface was first developed by Sytec Inc. (currently Hughes LAN
           Systems) for the International Business Machines Corporation (IBM) in 1983. It ran on a

                                                                                f
           primitive IBM LAN that supported a maximum of 72 devices and utilized proprietary

                                                                             ns
           Sytec
               Keyprotocols
                    fingerprintto=transport
                                   AF19 FA27information.
                                               2F94 998D According
                                                         FDB5 DE3D toF8B5
                                                                     Microsoft,
                                                                          06E4 who
                                                                                A169has a long
                                                                                     4E46

                                                                          tai
           working history with IBM, NetBIOS was not originally designed to grow to support

                                                                       re
           today’s massively size networks. Later revisions in the mid-80s made NetBIOS the de
           facto when configuring networking system components and programs.

                                                                   or
                   This paper focuses on NetBIOS when used over TCP/IP and the security

                                                                th
           questions about file sharing using the Operating Systems Windows 95, 98, and ME.
           When sharing file(s) and/or printer(s) on a LAN, and/or if one has enabled Microsoft
                                                            Au
           Networking, then what is called shares may be exposed to the Internet. Shares are file
           and printer resources that have been enabled for sharing. A lot of times these shares
                                                         2,

           are exposed without the owner of the machine realizing. They might lack a proper
                                                     00

           password (a proper password being a password meeting the criteria set by the level of
                                                  -2

           security one desires on his network or machine) or possibly no password. If somebody
           gains access to these shares via the Internet, then they can access your computer and
                                              00

           destroy and/or manipulate material located there within. Microsoft has posted a security
           bulletin and patch for this vulnerability at
                                           20

           http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulle
                                        te

           tin/MS00-072.asp and the bugtraq has recorded the vulnerability as ID number 1780.
                                      tu

           Understanding NetBIOS
                                    sti
                                 In

                 A NetBIOS request is provided in the form of a Network Control Block (NCB). A
           NCB is a 64 bytes data structure and is required in every single command given by
                               NS

           NetBIOS. NCBs specify the message location, name of destination, pointers to buffers,
                           SA

           and various command codes. The NCB must be unaltered until the command is
           completed, so it cannot be used for other commands while the command is still
           processing. However, once a command has completed, the NCB can be altered, and
                         ©

           reused for another command.
                 NetBIOS provides session and transport services. As seen in Figure One,
           NetBIOS is located in the OSI’s (Open Systems Interconnection) session layer and has
           a hand in all network communication.
              Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                               Figure One: NetBIOS Over IP (Anonymous)

© SANS Institute 2000 - 2002           As part of GIAC practical repository.              Author retains full rights.
s.
                                                                                        ht
                                                                                    rig
                                                                                ull
                                                                                 f
                                                                              ns
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

                                                                           tai
                                                                        re
                                                                    or
                                                                 th
                   However, it does not provide a standard frame or data format for transmission. A
           standard frame format is provided by a Transport protocol. The Transmission Control
                                                             Au
           Protocol (TCP) will be focused on in this paper. One can also use NetBIOS Extended
           User Interface (Netbeui) instead of TCP. It is not necessary to expand on Netbeui in this
                                                          2,

           paper, for more information on Netbeui, go to
                                                      00

           http://hdallen.home.mindspring.com/netb.htm.
                                                   -2

                   NetBIOS provides the choice to choose between two communication modes,
           datagram or session. Datagram mode sends each message independently. This is
                                               00

           referred to a connectionless communication. In this form of communication, all stations
           on the network are continually checking for datagrams. When a station finds a datagram
                                            20

           addressed to its name, it receives the message. There is no form of acknowledgement
                                         te

           that this machine received the message so you cannot guarantee safe passage of any
                                      tu

           messages you send. When utilizing datagrams you can either send messages to a
           specific workstation or broadcast to the entire network.
                                    sti

                   Session mode is connection oriented and lets two names (not two machines)
                                 In

           establish a connection. A session connection only looks at names, meaning you could
           have a connection setup between two devices on the same machine. The session
                               NS

           method allows larger messages to be handled, and provides error detection and
           recovery. If a message is not received successfully, an error is returned to the
                           SA

           application.
                        ©

           NetBIOS Names

                   The purpose of NetBIOS names is to identify resources on a network.
           Applications use these names to start and end sessions. Most of the time these
               Key fingerprint
           sessions            = AF19 FA27
                     will be between       2F94 998Dbut
                                      two machines   FDB5
                                                        oneDE3D  F8B5 06E4
                                                           can configure   A169 4E46
                                                                         a single machine with
           multiple applications, each of which could have a unique NetBIOS name. Each station
           that supports an application also has a NetBIOS station name that is user defined. If it
           isn’t user defined then NetBIOS derives the name by internal means.

© SANS Institute 2000 - 2002            As part of GIAC practical repository.              Author retains full rights.
16 aplhanumeric characters make up NetBIOS. Microsoft, however, limits these
           names to 15 characters and uses the 16th character as a NetBIOS suffix. The purpose
           of the NetBIOS suffix is to indentify the functionality installed or the registered device or
           service. The NetBIOS name space is flat, not hierarchical like DNS. For the NetBIOS
           name to be registered, the combination of characters must be unique within network. To

                                                                                            s.
           gain a deeper understanding of NetBIOS, lets look at how it registers itself. When the

                                                                                         ht
           client machine boots up, it broadcasts its NetBIOS information to every machine on the

                                                                                     rig
           network. If another client on the network already has the name, it responds with a
           broadcast stating that it already has registered the NetBIOS name. At this point the new

                                                                                 ull
           machine on the network stops trying to register. If not other machine on the network
           responds, the client finishes the registration process.

                                                                                  f
                   There are two types of names in a NetBIOS environment, unique and group. A

                                                                               ns
           unique
               Key name    must= not
                    fingerprint  AF19match
                                      FA27any
                                           2F94other
                                                 998Dname
                                                       FDB5on  the network.
                                                             DE3D    F8B5 06E4A group   name does not
                                                                                 A169 4E46

                                                                            tai
           have to be unique and all processes that have a given group name belong to the group.
           Each NetBIOS node maintains a table of all names currently owned by that node.

                                                                         re
                   NetBIOS is what makes file sharing possible. When located within a workgroup

                                                                     or
           or domain, you use NetBIOS to establish a connection when talking to shares located

                                                                  th
           on other machines in your network. Some consider NetBIOS to be a dangerous
           convenience in the Windows Operating System. This paper discusses file sharing
                                                              Au
           security but there are also many other risks associated with NetBIOS such as
           intelligence gathering using nbtstat.exe, allowing unwanted connections via command
                                                           2,

           lines, and also allowing machines to be able to gain certain privileges you might not
                                                       00

           want them to have. These security holes can be plugged with the appropriate practices.
                                                    -2

           This paper concentrates on enforcing file-sharing security but the above should also be
           considered when looking to see if your machine is at risk.
                                                00

           Am I at Risk?
                                             20
                                          te

               There are several factors to take into consideration when figuring out whether or not
                                       tu

           you are at risk. First, check to see if file and printer sharing for Microsoft Networks is
           installed as a network component on your machine. Just double click the network icon
                                    sti

           in the control panel, select the configuration tab and click on File & Print Sharing. If the
                                  In

           boxes on this screen are checked, then file sharing is enabled.
               Also, check to see if file and printer sharing for Microsoft Networks is bound to
                               NS

           TCP/IP on an adapter used for the Internet. Go back to the network icon located in the
                           SA

           control panel and double click it. Highlight the TCP/IP protocol that is pointing to your
           Network Interface Card. Click on Properties and then on the Bindings tab. If Client for
           Microsoft Networks and File and printer sharing for Microsoft Networks are installed
                        ©

           then your adapter has file sharing enabled.
               If you want to disable the above file sharing, follow the following directions:

               1. On the desktop, double-click on My Computer.
               Key fingerprint = AF19
               2. Double-click        FA27 2F94
                                 on Control     998D FDB5 DE3D F8B5 06E4 A169 4E46
                                            Panel.
               3. Double-click on Network.
               4. From the Configuration tab, click on the File & Print Sharing button.

© SANS Institute 2000 - 2002             As part of GIAC practical repository.               Author retains full rights.
5. Turn off file sharing and print sharing by clicking each box to remove the check
                  marks.
               6. Click on the OK button.
               7. Select the TCP/IP protocol that is pointing to your Ethernet card or USB cable
                  modem.

                                                                                            s.
               8. Click on the Properties button and click on the Bindings tab.

                                                                                         ht
               9. Click to uncheck the boxes next to "Client for Microsoft Networks" and "File and

                                                                                     rig
                  printer sharing for Microsoft Networks". NOTE: If there is more than one listing of
                  TCP/IP, steps 7-9 should be repeated.

                                                                                 ull
           Click the OK button twice and restart your computer.

                                                                                  f
                  Also check to see if Share(s) have actually been configured for file(s) and

                                                                               ns
           printer(s). Check =toAF19
               Key fingerprint   see ifFA27
                                        options
                                            2F94for filesFDB5
                                                  998D    and printers are checked
                                                               DE3D F8B5           under
                                                                           06E4 A169 4E46File and Print

                                                                            tai
           Sharing. A big area of vulnerability involved with file sharing is the use of easily cracked

                                                                         re
           passwords. A NetBIOS password that provides good security is one that is at least 8
           characters long, a mixture of alphabetic letters and numeric digits, not a recognizable

                                                                     or
           word or phrase, not something associated with you, different from your other previous

                                                                  th
           passwords, and still something you can remember.
                  There is no risk if you do not have files shared. Some administrators don’t want
                                                              Au
           their users to be able to create file shares. To uninstall NetBEUI from a machine follow
           these directions as taken from http://cable-dsl.home.att.net/index.htm#CaseB:
                                                           2,
                                                       00

               1. Open Control Panel - Network.
                                                    -2

               2. If NetBEUI is not installed in the Configuration list:
                      a. Click Add.
                                                00

                      b. Select Protocol.
                      c. Click Add.
                                             20

                      d. Select Microsoft as the Manufacturer, and then NetBEUI as the
                                         te

                          Network Protocol.
                                       tu

                      e. Click OK twice to close the Network windows.
                      f. Restart your computer if prompted to do so, and then reopen Network.
                                    sti

               3. If you do want to share files or printers on a local area network, enable File and
                                  In

                  Print Sharing:
                      a. Click on File and Print Sharing.
                               NS

                      b. Check (enable) the desired options for files and/or printer(s).
                      c. Click OK twice to close the Network windows.
                           SA

               4. Restart your computer if prompted to do so, and then reopen Network.
               5. Unless you normally logon to Microsoft Networks (e.g., Windows NT/2000/XP
                        ©

                  servers), Primary Network Logon should be set to Windows Logon.
               6. UN-bind TCP/IP from Microsoft Networking for all instances of TCP/IP that
                  point to a network adapter (including Dial-Up Adapter):
                      a. Open TCP/IP Properties by double-clicking on the TCP/IP entry in the
                          Configuration
               Key fingerprint = AF19 FA27 list2F94
                                                 that998D
                                                      points to a DE3D
                                                           FDB5   network adapter.
                                                                       F8B5        If you4E46
                                                                            06E4 A169     get the long
                          message starting "You have asked to change TCP/IP properties for a dial-
                          up adapter...", click OK.
                      b. Click on the Bindings tab.

© SANS Institute 2000 - 2002             As part of GIAC practical repository.              Author retains full rights.
c. UN-check the option File and Printer Sharing for Microsoft Networks
                       d. UN-check the option Client for Microsoft Networks.
                       e. Click OK twice to close the Network windows. If you get the message
                          "You have not selected any drivers to bind with. Would you like to select
                          one now?", click No.

                                                                                           s.
               7. Restart your computer if prompted to do so, and then reopen Network.

                                                                                        ht
               8. Make sure that NetBIOS is not enabled on all instances of TCP/IP that point

                                                                                    rig
                   to a network adapter (including Dial-Up Adapter):
                       a. Open TCP/IP Properties by double-clicking on the TCP/IP entry in the

                                                                                ull
                          Configuration list that points to a network adapter. If you get the long
                          message starting "You have asked to change TCP/IP properties for a dial-

                                                                                 f
                          up adapter...", click OK.

                                                                              ns
                       b. Click= on
               Key fingerprint      theFA27
                                 AF19   NetBIOS   tab. FDB5 DE3D F8B5 06E4 A169 4E46
                                             2F94 998D

                                                                           tai
                       c. UN-check (if checked) the option I want to enable NetBIOS over TCP/IP.
                       d. Click OK twice to close the Network windows.

                                                                        re
               9. Restart your computer if prompted to do so.

                                                                    or
               10. Close Control Panel.

                                                                 th
           Scope ID                                          Au
                    A NetBIOS Scope ID provides an extended naming service for the NetBIOS over
                                                          2,

           TCP/IP (known as NBT) module. The primary purpose of a NetBIOS scope ID is to
                                                      00

           isolate NetBIOS traffic on a single network to only those nodes with the same NetBIOS
                                                   -2

           scope ID. The NetBIOS scope ID is a character string that is appended to the NetBIOS
           name. The NetBIOS scope ID on two hosts must match, or the two hosts will not be
                                               00

           able to communicate. It also allows computers to use the same computer name if they
                                            20

           have different scope IDs. The Scope ID becomes a part of the NetBIOS name, making
           the name unique. A strong Scope ID is a good way to protect against outside intrusion.
                                         te

           This is because computers running NetBIOS over TCP/IP with Scope ID are invisible to
                                      tu

           other computers that do not have the same Scope ID. By default, the Scope ID is not
           set so normally such computers utilizing NetBIOS of TCP/IP is visible to everyone. By
                                    sti

           initiating the Scope ID, one basically locks out outside users trying to connect to your
                                 In

           NetBIOS session. For Windows 95 and 98, WINS must be enabled on the machine.
                               NS

           Fact VS Fiction
                           SA

                   Before jumping the gun and spending unnecessary time in locking down your
                        ©

           system, here are some things to keep in mind about file sharing. Your machine is not
           automatically threatened because File and Printer Sharing is enabled. It is only
           vulnerable if you have created unsafe file shares, which the above section can help you
           identify. Using strong passwords following the above rule set helps limit the chance of
           somebody cracking your share. Also, keep in mind removing Client for Microsoft
              Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
           Networks does not protect ones machine. The larger risk comes from the server
           component (i.e. File and Printer Sharing for Microsoft Networks) not the client
           component (i.e. Client for Microsoft Networks). If you remove Client for Microsoft
           Networks, you remove your ability to save passwords, so think about which one you

© SANS Institute 2000 - 2002            As part of GIAC practical repository.              Author retains full rights.
remove before you press that remove button. Finally, keep in mind that if you had
           unsafe file sharing enabled on your computer and you fixed the problem, you still might
           have been compromised. Run a virus checker to see if anybody has installed a virus or
           Trojan on your machine.

                                                                                           s.
           Conclusion

                                                                                        ht
                                                                                    rig
                   So file sharing in Windows 95, 98, and ME can carry a lot of risks, but it also
           brings a lot of rewards. Utilizing this document can help you secure file sharing. You

                                                                                ull
           also have a deeper understanding on how file sharing occurs through NetBIOS and
           windows networking. NetBIOS and file sharing have changed drastically since the late

                                                                                 f
                                                                              ns
           80s and networking technology is heading to new places. But these operating systems
           will Key fingerprint
                always          = AF19
                        be around   andFA27 2F94
                                        newer      998D FDB5
                                                interfaces      DE3D
                                                           will be    F8B5
                                                                   based on06E4 A169
                                                                            the old   4E46Keeping up
                                                                                    ones.

                                                                           tai
           with the past will prepare you for the future.

                                                                        re
                                                                    or
                                                                 th
                                                             Au
                                                          2,
                                                      00
                                                   -2
                                               00
                                            20
                                         te
                                      tu
                                    sti
                                 In
                               NS
                           SA
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002            As part of GIAC practical repository.              Author retains full rights.
References and Works Cited

           Allen, Doug. Doug’s Networking Pages. 1/6/01.
           URL: http://hdallen.home.mindspring.com/netb.htm

                                                                                           s.
           Anonymous. NETBIOS Overview. 9/27/97

                                                                                        ht
           URL:

                                                                                    rig
           http://support.baynetworks.com/library/tpubs/html/router/soft1200/117358AA/B_39.HTM

                                                                                ull
           Beal, Melissa. Definition of NetBIOS. 7/27/01.

                                                                                 f
           URL: http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci212633,00.html

                                                                              ns
              Key fingerprint
           Bugtraq.           = AF19 FA27
                    Microsft Windows      2F94
                                      9x/Me    998D
                                            Share    FDB5
                                                  Level     DE3DByp.
                                                        Password F8B510/10/00.
                                                                      06E4 A169 4E46

                                                                           tai
           URL: http://www.securityfocus.com/bid/1780

                                                                        re
           Lirik. NT NetBIOS Hacking. 3/31/99.

                                                                    or
           URL: http://www.seclabs.org/netbios/netbios.htm

                                                                 th
           Microsoft. Security Bulletin MS00-72. 02/16/00.   Au
           URL:
                                                          2,
           http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS0
           0-072.asp
                                                      00
                                                   -2

           Microsoft. Using and Troubleshooting the TCP/IP Scope ID. 8/8/01.
           URL: http://support.microsoft.com/default.aspx?scid=kb;EN-US;q138449
                                               00
                                            20

           Navas, John. Cable Modem / DSL Tuning Guide. 9/26/99.
           URL: http://cable-dsl.home.att.net/index.htm#CaseB
                                        te
                                      tu

           Navas, John. The Navas Group Home Page. 12/7/01.
                                    sti

           URL: http://cable-dsl.home.att.net/netbios.htm#Risk
                                 In

           NeonSurge. Understanding NetBIOS. 01/29/01.
           URL: http://www.ladysharrow.ndirect.co.uk/NT/understanding_netbios.htm
                               NS
                           SA

           Winston, Gavin. NetBIOS Specification. 1999.
           URL: http://members.tripod.com/~Gavin_Winston/NETBIOS.HTM
                        ©

               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002            As part of GIAC practical repository.               Author retains full rights.
Last Updated: January 18th, 2021

      Upcoming Training

Cyber Threat Intelligence Summit & Training 2021     Virtual - US Eastern,   Jan 21, 2021 - Feb 01, 2021    CyberCon

SANS Cyber Security West: Feb 2021                   ,                       Feb 01, 2021 - Feb 06, 2021    CyberCon

Open-Source Intelligence Summit & Training 2021      Virtual - US Eastern,   Feb 08, 2021 - Feb 23, 2021    CyberCon

SANS Secure Japan 2021                               , Japan                 Feb 22, 2021 - Mar 13, 2021    CyberCon

SANS Scottsdale: Virtual Edition 2021                ,                       Feb 22, 2021 - Feb 27, 2021    CyberCon

SANS London February 2021                            , United Kingdom        Feb 22, 2021 - Feb 27, 2021    CyberCon

SANS Cyber Security East: March 2021                 ,                       Mar 01, 2021 - Mar 06, 2021    CyberCon

SANS Secure Asia Pacific 2021                        , Singapore             Mar 08, 2021 - Mar 20, 2021    CyberCon

SANS Secure Asia Pacific 2021                        Singapore, Singapore    Mar 08, 2021 - Mar 20, 2021    Live Event

SANS Cyber Security West: March 2021                 ,                       Mar 15, 2021 - Mar 20, 2021    CyberCon

SANS Riyadh March 2021                               , Kingdom Of Saudi      Mar 20, 2021 - Apr 01, 2021    CyberCon
                                                     Arabia
SANS Secure Australia 2021                           Canberra, Australia     Mar 22, 2021 - Mar 27, 2021    Live Event

SANS Munich March 2021                               , Germany               Mar 22, 2021 - Mar 27, 2021    CyberCon

SANS Secure Australia 2021 Live Online               , Australia             Mar 22, 2021 - Mar 27, 2021    CyberCon

SANS 2021                                            ,                       Mar 22, 2021 - Mar 27, 2021    CyberCon

SANS Cyber Security Mountain: April 2021             ,                       Apr 05, 2021 - Apr 10, 2021    CyberCon

SANS SEC401 (In Spanish) April 2021                  , Spain                 Apr 12, 2021 - Apr 23, 2021    CyberCon

SANS Cyber Security East: April 2021                 ,                       Apr 12, 2021 - Apr 17, 2021    CyberCon

SANS London April 2021                               , United Kingdom        Apr 12, 2021 - Apr 17, 2021    CyberCon

SANS Autumn Australia 2021                           Sydney, Australia       Apr 12, 2021 - Apr 17, 2021    Live Event

SANS Autumn Australia 2021 - Live Online             , Australia             Apr 12, 2021 - Apr 17, 2021    CyberCon

SANS Secure India 2021                               , Singapore             Apr 19, 2021 - Apr 24, 2021    CyberCon

SANS Baltimore Spring: Virtual Edition 2021          ,                       Apr 26, 2021 - May 01, 2021    CyberCon

SANS Cyber Security Central: May 2021                ,                       May 03, 2021 - May 08, 2021    CyberCon

SANS Security West 2021                              ,                       May 10, 2021 - May 15, 2021    CyberCon

SANS Cyber Security East: May 2021                   ,                       May 17, 2021 - May 22, 2021    CyberCon

SANS In French May 2021                              , France                May 31, 2021 - Jun 05, 2021    CyberCon

SANS Stockholm May 2021                              , Sweden                May 31, 2021 - Jun 05, 2021    CyberCon

SANS Cyber Security Central: June 2021               ,                       Jun 07, 2021 - Jun 12, 2021    CyberCon

SANS SOC Training 2021                               ,                       Jun 14, 2021 - Jun 19, 2021    CyberCon

SANS Cyber Defence Asia Pacific 2021 - Live Online   , Australia              Jun 28, 2021 - Jul 10, 2021   CyberCon
You can also read