Windows permissions and security issues

Source: Internet
Author: User

Author:Thorn

Let's review an article I wrote six or seven years ago. The real time is no longer enough because I forgot it.

At that time, I wrote this article for the purpose of learning and researching.NT PermissionsBut I didn't proceed further.

RecentExploit: Windows 2003 Server Token KidnappingThis is also a problem.SeImpersonatePrivilegeAndTokenClosely related.

In factPermission --- token --- ACLThere are still many other problems in this integration system. In the past, there were very few people who studied this system. If you want to study it, you can refer to my next article. The research method should be similar.

Because I was still young when I wrote the article, I was about 10 years old. The writing method was still immature. Please do not laugh. Some old friends are also mentioned in the article. I really miss them. The image has been lost, but it does not affect reading.

About the ACL, Token, permission and security of NT
----- Another way to clone accounts

Author: aXis)

Source: www.ph4nt0m.net .)

Abstract: About the acl, token, and privilege of nt, and bypassing the acl through privilege, the object access is achieved. It can be said that it is another way to clone the administrator, but it is more concealed and difficult to use. It is necessary to bypass the detection. Currently, the breakthrough is to bypass the acl using permissions.

Keywords: ACL, ACE, DACL, TOKEN, SID, PRIVILEGE

1. Basic concepts (This section describes basic concepts such as tokens and ACLs, and prepares for the second part. If you already know about the content, skip this section)

1. What is a TOKEN)

When a user logs on to Windows NT/2000/XP and passes identity authentication, the system will assign a token to the user. A token is a data structure used for all processes and threads activated by this user. The structure of the token is as follows:

Token source

Impersonation Type

Token ID

Authentication ID

Modified ID

Expiration Time

Default Primary Group

Default DACL

User Account SID

Group 1 SID

......

Group n SID

Restricted SID 1

......

Restricted SID n

Privilege 1

......

Prililege n

This is not easy to understand. Let's look at an instance and use whoami.exe in win2000 resource Kitto view the detailed information in the Access Token of the current user.

C:> whoami/all
[User] = "DARKDEAMONAdministrator" S-1-5-21-1409082233-1957994488-47230797
1-500
[Group 1] = "DARKDEAMONNone" S-1-5-21-1409082233-1957994488-472307971-513
[Group 2] = "Everyone" S-1-1-0
[Group 3] = "BUILTINAdministrators" S-1-5-32-544
[Group 4] = "BUILTINUsers" S-1-5-32-545
[Group 5] = "nt authorityinteractive" S-1-5-4
[Group 6] = "NT AUTHORITYAuthenticated Users" S-1-5-11
[Group 7] = "LOCAL" S-1-2-0

(X) SeChangeNotifyPrivilege =

(O) SeSecurityPrivilege =

(O) SeBackupPrivilege =

(O) SeRestorePrivilege =

(O) SeSystemtimePrivilege =

(O) SeShutdownPrivilege =

(O) SeRemoteShutdownPrivilege =

(O) SeTakeOwnershipPrivilege =

(O) SeDebugPrivilege =

(O) SeSystemEnvironmentPrivilege =

(O) SeSystemProfilePrivilege =

(O) SeProfileSingleProcessPrivilege =

(O) SeIncreaseBasePriorityPrivilege =

(X) SeLoadDriverPrivilege =

(O) SeCreatePagefilePrivilege =

(O) seincreasequot1_vilege =

(X) SeUndockPrivilege =

(O) SeTcbPrivilege =

C:>

This is the information in my token, including my SID, the group to which it belongs, the detailed list of permissions, and so on. Therefore, the token determines a user's ability on a computer.

2. security identifier (SID)

The SID is assigned by the system when a user or group is created. It is unique. When a local user logs on, the SID is retrieved from the user database in SAM.

For the SID structure, refer to the section in "INSIDE WINDOWS2000:

A sid is a variable-length numeric value that consists of a SID structure revision number, a 48-bit identifier authority value, and a variable number of 32-bit subauthority or relative identifier (RID) values.

Below are some built-in SID

Well-Known SIDs

SID
Group
Use

S-1-1-0
Everyone
A group that includes des all users.

S-1-2-0
Local
Users who log on to terminals locally (physically) connected to the system.

S-1-3-0
Creator Owner ID
A security identifier to be replaced by the security identifier of the user who created a new object. This SID is used in inheritable access-control entries (ACEs ).

S-1-3-1
Creator Group ID
Identifies a security identifier to be replaced by the primary-group SID of the user who created a new object. Use this SID in inheritable ACEs.

The number ending with SID is RID (relative identifier ). 500 indicates the Administrator group, and the GUEST group is 501.

The clone Administrator Account proposed by ADAM is to clone the SID of an account to 500, so that the system will think it is the administrator.

For a complete SID structure, see the SID in the above token.

S-1-5-21-1409082233-1957994488-472307971-500

3. What is the access control list (ACL)

ACL (access control list) is literally easy to understand. A system uses ACL to determine the extent to which users access resources. There are two types of ACLs: DACL (Discretionary Access Control List) and SACL (System Access Control List ). DACL includes the list of users and groups, as well as the corresponding permissions, allowing or rejecting them to determine the access permissions to resources. SACL is used to determine the audit policy of security resources. An ACL consists of zero or multiple accesskeys (Access Control Entries). An ACE includes a SID and a description of the resource that the SID can Access, such as allow and deny. Deny takes precedence over allow.

In win2000 resource kit, there are several tools about acl, which is typically xcacls. The following is an example of using xcacls to view the acl.

C: Program FilesResource Kit> xcacls whoami.exe

C: Program FilesResource Kitwhoami.exe BUILTINUsers: R

BUILTINPower Users: C

BUILTINAdministrators: F

Nt authoritysystem: F

Nt authorityterminal server user: C

C: Program FilesResource Kit>

Other tools related to aclinclude svcacls.exe, showaclsand subinacl.exe. I will not go into detail here.

4. Permission (privilege)

In short, permissions are the permissions granted to users by the system. They allow or do not allow privileged operations that affect the entire computer system, rather than a specific object. The following table lists some system permissions and functions.

Privilege
Windows Privilege
Description

SeTcbPrivilege
Act as part of the operating system
Allows a process to authenticate like a user and thus gain access to the same resources as a user. Only low-level authentication services shocould require this privilege.

SeMachineAccountPrivilege
Add computers to a domain
Allows the user to add a computer to a specific domain. For the privilege to be valid, it must be assigned to the user as part of local security policy for domain controllers in the domain.

SeBackupPrivilege
Back up files and directories
Allows the user to circumvent file and directory permissions to back up the system. the privilege is checked only when an application attempts access through the NTFS backup application programming interface (API ). otherwise, normal file and directory permissions apply.

By default, this privilege is assigned to Administrators and Backup Operators. See also Restore files and directories in this table.

SeChangeNotifyPrivilege
Bypass traverse checking
Allows the user to pass through folders to which the user otherwise has no access while navigating an object path in any Windows file system or in the registry. this privilege does not allow the user to list the contents of a folder; it allows the user only to traverse its directories.

By default, this privilege is assigned to Administrators, Backup Operators, Power Users, Users, and Everyone.

SeSystemTimePrivilege
Change the system time
Allows the user to set the time for the internal clock of the computer.

By default, this privilege is assigned to Administrators and Power Users.

SeCr

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.