Securing RPC/ActiveX/DCOM Flashcards

(60 cards)

1
Q

What is RPC?

A

Remote Procedure Call, a mechanism for client-server communication since 1993.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two RPC variants?

A

DCE RPC (Windows) and ONC RPC (Sun RPC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which RPC does Windows use?

A

DCE RPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DCE RPC used for?

A

Communication in DCOM and ActiveX applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the first RPC vulnerability?

A

Malformed Security Identifier Request, causing LSA to hang.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the LsaLookupSids API issue?

A

Forwards malformed data over RPC, leading to system hang.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is MS99-057?

A

Bulletin for Malformed Security Identifier Request patch, December 1999.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the MS99-057 vulnerability cause?

A

Windows NT 4.0 stops responding to service requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the second RPC attack?

A

Sending garbage to port 135, causing 100% CPU usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which systems are affected by the port 135 attack?

A

Windows NT 3.51 and 4.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is the port 135 attack executed?

A

Via a Telnet client, triggering a denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the third RPC vulnerability?

A

Malformed RPC requests causing service failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which servers are affected by malformed RPC requests?

A

MS Exchange Server 5.0 and SQL Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the impact of the third RPC vulnerability?

A

System failure requiring a reboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can a firewall mitigate RPC vulnerabilities?

A

Block RPC services except for trusted users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the fourth RPC vulnerability?

A

Malformed RPC Request causing service failure (MS01-041, July 2001).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What causes the fourth RPC vulnerability?

A

RPC server stubs not validating requests before passing to services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does RPC function?

A

Client sends function calls to server via RPC runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is LRPC?

A

Local RPC, used by some Windows applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What components make up an RPC app?

A

Client code, server code, IDL file, optional ACF file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an IDL file?

A

Interface Definition Language file for RPC interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is an ACF file?

A

Application Configuration File, optional for RPC apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Is RPC stateless?

A

Yes, it doesn’t maintain client data between calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are context handles in RPC?

A

Opaque data structures for maintaining state between client calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a DoS threat in RPC?
Sending malformed data to an RPC endpoint.
26
What is an information disclosure threat in RPC?
Unprotected data sniffed during client-server communication.
27
What is a data-tampering threat in RPC?
Intercepting and modifying unprotected data on-the-wire.
28
What is the robust MIDL switch?
Adds runtime checking to RPC server data marshalling.
29
From which Windows version does robust MIDL work?
Windows 2000 and later.
30
What is the [range] attribute in IDL?
Limits parameter values to prevent out-of-bounds errors.
31
How does [range] reduce RPC risks?
Prevents attackers from setting invalid data sizes.
32
Why require client authentication in RPC?
Deters attackers by requiring identity disclosure.
33
What function sets client authentication?
RpcBindingSetAuthInfo for authentication and privacy.
34
What does the RPC server check?
Client’s security settings to ensure they meet requirements.
35
What is the performance impact of RPC authentication?
Approximately 10% degradation.
36
What is RPCSvc?
A sample app in MS Platform SDK to test RPC performance.
37
What is DCOM?
A wrapper over RPC for network-based COM communication.
38
How is DCOM configured?
Via Dcomcnfg.exe or registry editing.
39
What is Dcomcnfg.exe?
Tool to configure DCOM settings in Component Services.
40
Where are DCOM settings stored?
HKLM\Software\Classes\AppId in the registry.
41
What are DCOM launch permissions?
Define who can start a DCOM application.
42
What are DCOM access permissions?
Control who can access DCOM objects.
43
What is the safest DCOM user context?
Run as a specific non-privileged user.
44
Why is Interactive User dangerous?
Vulnerable to privilege-escalation attacks.
45
Why is Local System Account risky?
Most powerful account, dangerous if compromised.
46
What is a safer DCOM impersonation level?
Identify, limiting privilege escalation risks.
47
What are LocalService and NetworkService?
Low-privilege accounts for DCOM execution.
48
What are ActiveX controls?
Executable programs, often COM-based, used in apps or browsers.
49
What does code signing ensure for ActiveX?
Verifies author identity and code integrity.
50
Why are ActiveX controls risky?
Vulnerabilities can be exploited, even in legitimate controls.
51
What exacerbates ActiveX vulnerabilities?
Lack of user warnings when invoked by HTML or email.
52
Why aren’t ActiveX controls inherently hostile?
Hackers repurpose legitimate controls via vulnerabilities.
53
What is safe initialization in ActiveX?
Ensuring controls don’t execute unsafe actions on startup.
54
What is safe scripting in ActiveX?
Preventing scripts from triggering dangerous control functions.
55
How to determine ActiveX safety?
Check if it accesses, discloses, modifies, or crashes systems.
56
What is an unsafe ActiveX function?
Accessing local files, registry, or private data.
57
Why not mark ActiveX as safe by default?
Prevents enabling potentially unsafe functionality.
58
What is the benefit of non-privileged DCOM users?
Reduces hacker interest in compromising the account.
59
Why block RPC services in firewalls?
Limits exposure to untrusted internet users.
60
What is the role of RPC server stubs?
Validate and pass client requests to services.