b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

0 32
Before watching the article, everyone can pay attention to my public account, se...

Before watching the article, everyone can pay attention to my public account, search for 'How difficult it is to do information security assessment', find 'Ability Verification Environment' in the lower menu bar, reply to the corresponding keywords to get the 2022 ability verification guidebook and VMware virtual environments for free for Linux (free), Windows, and Mysql systems, which can be used together with the article for better reproduction.

Alright, let's get straight to the point without any further talk.

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

Before the assessment starts, let's determine the importance of this server and the account passwords

1698200685_65387c6d901002230e68e.png!small?1698200690036

Firstly,  Identity authentication

a) The user should be identified and authenticated during login, the identity should be unique, and the authentication information should have complexity requirements and be changed regularly;

1698200705_65387c81424d6eb6f7cbc.png!small?1698200709925

The first clause does not have any obvious pitfalls, we just need to follow the assessment process, view

Control Panel - Management Tools - Local Security Policy - Account Policy - Password Policy

1698200737_65387ca14fcfb4b50d345.png!small?1698200741930

Next, compare the corresponding password security policy of key assets and find thatMinimum password length, maximum password usage periodThese two parameters do not meet the requirements

1698200769_65387cc13517c1b421df7.png!small?1698200773551

The first question is relatively simple, without any doubts


b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out when the login connection times out;

1698200786_65387cd2de8ac56720f62.png!small?1698200791557

Let's first look at the first point, the login failure handling function,Control Panel - Management Tools - Local Security Policy - Account Policy - Account Lockout Policy

1698200800_65387ce03d2e25ba26506.png!small?1698200804728

Next, let's compare the content required by the key asset in the security policy and find that it requiresLocking time is 30 minutesTherefore, it violates the requirements of the security policy

1698200821_65387cf53d3f0f4633326.png!small?1698200825537

Next, let's take a look at the automatic logout function due to operation timeout,Control Panel → All Control Panel Items → Management Tools → Local Security Policy → Local Policy → Security Options → Interactive Logon: Computer Inactivity Limit

1698230316_6538f02c215dc070738c8.png!small?1698230316983

After configuring the corresponding time here, it will be directly reflected on the screen saver, even if the option 'Display login screen when resumed' is not checked, it will also require re-entering the password for identity authentication after the time is up.

1698200846_65387d0e1de8912468d15.png!small?1698200850846

At the same time, the security policy requires the configuration of key asset timeout login mechanism to be15 minutesTherefore, violating the security policy

1698200860_65387d1cf3e7c6aba16f4.png!small?1698200865327


1698200866_65387d22ce0fec343fe97.png!small?1698200871102


c) When performing remote management, necessary measures should be taken to prevent the interception of authentication information during network transmission;

1698201015_65387db7a017278b50c6a.png!small?1698201020432

This question is a bit interesting, different from our previous viewing methods, we may have checked here before, runninggpedit.msc→Windows Components→Remote Desktop Services→Remote Desktop Session Host→SecurityA look, none were configured, it may directly draw the conclusion that does not meet the requirements.

1698201033_65387dc90ab87e06f01f7.png!small?1698201037613

1698201040_65387dd0b41f277c7e57b.png!small?1698201045339

This is also based on the answer provided and the subsequent test to find the clue, we usesslscan Tool to detect the protocol used by the target port 3389, command:sslscan.exe ip:port

It was found that Windows Server 2008 defaults to only support TLS 1.0

1698201055_65387ddf9c6cb65d86576.png!small?1698201060013

While Windows Server 2016, by default, Windows Server 2016 supports TLS1.0, TLS1.1, and TLS1.2, and needs to modify the registry to force the use of TLS1.2 for communication, we use sslscan.exe 172.17.200.45:3389

1698201072_65387df0de937e79f06b3.png!small?1698201077215

It was found that TLS1.1, 1.2, and 1.3 are all enabled. And the configuration here gpedit.msc→Windows Components→Remote Desktop Services→Remote Desktop Session Host→Security content, the detection results did not change, and alternative solutions need to be sought. Online resources are also quite scattered, and later a configuration in the registry confirmed that the target can be set to force the use of TLS1.2. Disabling TLS 1.0 and TLS 1.1 on Windows Server 2016 can be achieved by modifying the registry. Please follow the following steps to operate:

  1. Open the "Registry Editor". You can search for "Registry Editor" in the start menu and open it.
  2. In the registry editor window, expand the following path in sequence:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols 
  3. Under the "Protocol" folder, find the folders named "TLS 1.0" and "TLS 1.1". If these folders cannot be found, they need to be created manually.
  4. Under the "TLS 1.0" and "TLS 1.1" folders, create a folder named "Client" and "Serverfolder.
  5. Under the "Client" and "Server" folders, create a folder named "DisabledByDefaultSet the DWORD value to 1.
  6. Under the "Client" and "Server" folders, create a folder named "EnabledofDWORDSet the value, and set the numerical data to 0.

1698201133_65387e2d359f49d530e21.png!small?1698201137784

After the configuration is complete, restart and use the SSL tool for detection. It was found that the remote communication is now only allowed to use TLS1.2 protocol.

1698201143_65387e373987c4527d5ab.png!small?1698201

你可能想看:

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

最后修改时间:
admin
上一篇 2025年03月27日 10:23
下一篇 2025年03月27日 10:46

评论已关闭