Microsoft Windows Security Architecture Flashcards

1
Q

Security Architecture - Security Reference Monitor:

A

The SRM defines the access token data structure, performs access control on objects, manipulates privileges and emits audit records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Architecture - Local Security Authority:

A

The LSA subsystem is a user-mode process and maintains the local system security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Architecture - LSASS Policy Database:

A

Loaded from the registry, includes Active Directory and server trust settings and access rights, will also contain domain logon keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Architecture - Security Accounts Manager:

A

The SAM service manages local user and group names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Architecture - Active Directory:

A

When running, operates in the LSASS process alongside the SAM and LSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Architecture - Authentication Packages:

A

Extensions to basic authentication mechanisms, will run in the LSASS context and act as an authentication provider to the remainder of LSASS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Architecture - Winlogon:

A

The interactive login user-mode component responding to the System Attention Sequence (SAS) and creating a user’s first process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Architecture - LogonUI:

A

The Logon User Interface is a user-mode process presenting a visual interface for authentication, but interfaces with different credential providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Architecture - Credential Providers:

A

COM objects running within the LogonUI process once Winlogon has triggered LogonUI after a SAS event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Architecture - Netlogon:

A

Sets up a secure channel to an Active Directory or legacy Domain Controller for interactive authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Architecture - KSecDD:

A

The Kernel Security Device Driver is a library of components implementing local procedure call interfaces to other kernel-mode security components, e.g. The Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The object-based design of Windows allows handling of most entities within the operating system as objects…

A

This includes all system resources exposed to user mode. Objects are accessed via the Object Manager, which maintains name spaces and handles, the latter on a per-process basis. Any access requires the specification of desired access privileges on handle creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows Security Identifiers (SIDs) are unique…

A

On installation each machine is issued with a SID. Accounts and other derivative entities are then derived from this source SID. N case of domain accounts, the relative security identifiers (RIDs) are based on that of the domain controller. Some RIDs are pre-defined for special roles and groups, these are well known SIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Machines can be cloned, although for proper operations…

A

The SID will need to be adjusted after cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Winlogon creates a unique ephemeral SID for each interactive login session, called a logon SID…

A

This can be used to generate a unique access token, which is then tied to the interactive window station and desktop. The SID for a logon session is fixed, but the RID is randomly generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SIDs are also used to specify integrity levels. These range from…

A

Untrusted via Low, Medium to High and System

17
Q

Tokens exist to identify security contexts of processes and threads and also include session identifiers, privileges, group, accounts, integrity levels and the UAC virtualisation state…

A

Initial tokens are created on logon and are inherited but can be modified or filtered. In addition to inheritance, Windows frequently uses Impersonation to temporarily change security contexts

18
Q

Auditing Mechanism - The Object Manager:

A

May generate audit records

19
Q

Auditing Mechanism - Kernel-Level Code:

A

Can always generate audit records

20
Q

Auditing Mechanism - User-Level Code:

A

Can generate audit records, but must have the appropriate privilege set in an object’s SACL

21
Q

Audit behaviour is then controlled by the Local Security Policy maintained by the LSASS and executed by the SRM, the SRM…

A

Generates audit events and sends them to LSASS via ALPC

22
Q

Auditing Mechanism - The LSASS receives…

A

Audit records, formats and amends them and forwards them to the Event Logger

23
Q

Virtualisation can be considered as the…

A

Construction of an isomorphism from guest to host state

24
Q

Hardware must assist VM monitor in insulating virtual machines…

A

Any immediate VM access to physical hardware would allow VM to violate isolation boundaries

25
Virtualisation Requirements:
* All access to the virtual system instruction system architecture by the guest must be emulated by a monitor in software * Guest system state must be kept in memory * Guest system instructions must be implemented as functions within the VM monitor
26
Virtualisation Approaches - Objective of CPU Virtualisation:
* Process all unprivileged instructions unchanged | * Emulate all privileged instructions
27
Virtualisation Approaches - Trap and Emulate:
* Privileged instructions from guest VM cause privileged state trap * A processor is only virtualisable if all instructions either execute normally or if privileged, trap.
28
Virtualisation Approaches - Problems with Trap and Emulate:
* Not every instruction set architecture supports this * Cost of traps can be high, particularly in ISAs requiring "deep" pipelines * The VM monitor requires use of a privileged level for trapping
29
Virtualisation Approaches - Binary Translation:
* Code is analysed a priori or on the fly and translated * Privileged instructions are substituted with code causing the desired effect in the mapped state: This does not affect the state of the physical hardware
30
Virtualisation Approaches - Challenges for Binary Translation:
* Complex ISAs have internal state which needs to be maintained: Particularly problematic for viewing translation cache indices not normally visible to software * Synchronisation of PC upon interrupts * Handling of self-modifying code
31
Virtualisation generally provides the guest system with:
* Virtual memory environment * Device drivers or virtual devices, multiplexing physical hardware or emulating devices * Images of one or more file systems
32
Interactions among the host system, the virtualised system and device drivers may result in behaviour that is substantially different from that of a direct instantiation. Counter-forensics mechanisms make use of this to...
Detect if they are running inside a sandbox. Common problems also for forensics of cloud-based systems including modern PaaS environments
33
Microsoft Hyper-V...
* Virtualisation requires adaptation to the given hardware implementation via the HAL layer as access is now directed via Hyper-V * Support is provided for operating efficiently as hypervisor - in this case a Windows instance will operate as a parent, offering virtualisation services (VSP) to clients (VSC) * The VMbus allows efficient inter-VM communication, but this can also be misused * Optimisations allow the detection of running in a client partition and adapting behaviour according to avoid forcing the hypervisor to emulate inefficient behaviour * This has been the major construction site for the server code
34
VMWare:
A common example of direct virtualisation supporting a number of client operating systems and running on a number of different host platforms. Some problems arise, e.g. From non-persistent virtual machines or branches of other machines
35
Xen:
An example of a paravirtualised environment: As this has explicit client-side support, it is trivial to detect by anti-forensics software. Can also run on top of a regular operating system with appropriate hardware support