Differences between revisions 25 and 26
Revision 25 as of 2021-02-09 22:21:24
Size: 5065
Editor: scot
Comment:
Revision 26 as of 2021-02-11 16:10:17
Size: 5830
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 9: Line 9:
       a. Decide how updates should be installed for your situation
       a. Set the updates using either
          i. the GUI or
          i. Through the registry HKEY_LOCAL_MACHINE > SOFTWARE > Policies > Microsoft > Windows > WindowsUpdate > AU or
          i. Via powershell
             1. {{{Install-Module PSWindowsUpdate}}}
             1. {{{Get-Command -module PSWindowsUpdate}}} # to list the commands available.
             1. {{{Add-WUServiceManager -MicrosoftUpdate}}} # to enable additional updates.
             1. {{{Install-WindowsUpdate -MicrosoftUpdate -AcceptAll -AutoReboot}}} and add the following to log the result to a file: {{{| Out-File "\\server\share\log$($env.computername-Get-Date -f yyyy-MM-dd)-MSUpdates.log" -Force}}}

Lab 03.5 Hardening the OS

Created in 2019 - for Chapter 4 in ISBN: 978-0-7897-5912-2.

Goal

  1. Harden Windows 2019 server and Linux (Ubuntu/Kali).
    1. Update Plan / Policy and automate the policy where possible.
      1. Decide how updates should be installed for your situation
      2. Set the updates using either
        1. the GUI or
        2. Through the registry HKEY_LOCAL_MACHINE > SOFTWARE > Policies > Microsoft > Windows > WindowsUpdate > AU or

        3. Via powershell
          1. Install-Module PSWindowsUpdate

          2. Get-Command -module PSWindowsUpdate # to list the commands available.

          3. Add-WUServiceManager -MicrosoftUpdate # to enable additional updates.

          4. Install-WindowsUpdate -MicrosoftUpdate -AcceptAll -AutoReboot and add the following to log the result to a file: | Out-File "\\server\share\log$($env.computername-Get-Date -f yyyy-MM-dd)-MSUpdates.log" -Force

    2. Remove unnecessary programs - List installed programs from Power Shell!
    3. Stop or remove unnecessary services.
    4. Audit open ports
  2. Answer these points to discussion
    1. How much update automation should be done? In production environments, how is this handled?
    2. How do we collect status information (Windows and Linux)?
    3. How do you know if an OS or application is vulnerable? We'll look at this more later.
    4. What tools are available to manage patches, updates etc. for each of the OSs that we have installed.
    5. What happens when a snap shot is in play? Should one ever be used in production?
    6. What are the advantages and disadvantages of moving services to non-standard ports?

Essentially we are going to take a shot at implementing least functionality. See NIST and DoD

Setup

  1. Install the latest Moin wiki on your Ubuntu system. Use it to document your plan, configuration etc. Make it available outside your network.

Scenario. You are trying to protect your network from attack by hardening the operating systems in use: Windows Server 2019, Ubuntu, Kali and a legacy system that requires Ubuntu 14.04 (our metasploitable application). Unfortunately, circumstances forbid you from changing the Ubuntu 14 server. So for now, we'll just firewall outside access, and look at giving outside access later.

  1. Create a plan to harden your systems. Include sections for each of your operating systems.
    1. Updating Windows Server 2019

    2. Updating Linux systems
  2. For each of the above update sections sure to include the following:
    1. Policy including rationale for the actions and automation where appropriate. Include a WSUS installation as part of your Windows Plan.
    2. Configuration is usually controlled on windows by Group Policy, what is available for Linux?

    3. What role do backups or snapshots play in the upgrade process.

    4. Testing Plan for update - What tests should you run after updates to guarantee your applications will continue to operate correctly.
  3. Remove unneeded programs.
  4. Document and perform hardening configuration changes (e.g. moving services to non-standard ports etc.)

Show Me / Grade Guide

This will require that you both create a video and create pages on your wiki. Please create a page that links to the other pages on your wiki and upload your video on an appropriate page (e.g. Lab03.5)

  1. Show that Moin is accessible from outside your network directly and that it IS UP-TO-DATE!
  2. Document, in your wiki, what systems applications are installed on each of the systems - verify that you know what every one of them is for (by documenting their purpose)!

    1. Hint: You should find those packages on linux that don't have another package that depends on them. (You'll have to look and maybe even do some data manipulation). We should be able to do this with Power Shell for windows too.

  3. Document, in your wiki, what systems services are installed on each of the systems - verify that you know what every one of them is for!

    1. Hint = Same as the last one.
  4. Document, in your wiki, the listening ports on each system, what executable is responsible for them and verify that you need each one.

Additional Notes

  1. Moin
    1. In installing Moin, to get the commandline "moin account create ..." to work I had to add the following line at line 32 to /usr/local/lib/python2.7/dist-packages/MoinMoin/config/multiconfig.py: sys.path.insert(0, '/usr/local/share/moin')

    2. After this I used # moin account create ... to create an account

    3. Then I cleaned the cache: # moin maint cleancache

    4. Since I did the above by root, I then executed # chown -R www-data.www-data [moin directory]

    5. That was it for moin I logged in and it worked!
  2. I set my hostname to ubuntu.dra.local
  3. I setup apache2 to use ssl with a 4096 bit key. See: https://websiteforstudents.com/setup-apache2-http-with-self-signed-ssl-tls-certificates-on-ubuntu-16-04-lts-servers/

  4. Installed unattended-upgrades on ubuntu and kali. Removed mimikatz from kali so that it would update.

NetworkSecurity/Lab/Lab03.5 (last edited 2021-05-25 14:01:12 by scot)