Day 7 Flashcards
DACL ACE’s order precedence
explicit deny
explicit allow
inherited deny
inherited allow
Universal Naming Convention
if you are denied access to a folder but given access to a file within the folder, use the UNC path (file path) to access the file
Take ownership
In 6* architecture, the administrator can directly assign a new owner.
In 5* architectures, a user must have the special permission and then exercise that permission
copying files/folders
must have read at the source.
must have write at the destination.
because the copied file is a new instance, permissions are inherited from the parent directory
moving files/folders
must have read and delete at the source.
must have write at the destination.
When moved within the same volume, permissions are retained.
when moved to a different volume, permissions are inherited from the parent folder
exFAT (FAT64)
more storage than FAT16 or FAT32.
less functionality, and less overhead, than NFTS.
best option when you need to save files larger than 4GB.
often used for thumbdrives.
Like older FAT, exFAT still has allocation table, root directory, entries and timestamps.
allocation table
exFAT uses a bitmap to track cluster allocation status.
FAT will still be used to track clusters should data become fragmented
root directory
Root directory tracks files, subdirectories and the bitmap.
32 bytes in length
file directory entries
found within the root directory.
files have a minimum of 3 entries and a max of 19. (directory sets)
contain file attributes (RASH), time stamps (MAC), file name, file size, and cluster information.
timestamps
three main timestamps: created, accessed, and written/modified.
accessed timestamp reflects accurate date and time (unlike FAT).
Remote Procedure Call (RPC)
windows uses RPC to allow a program runninig on one computer to seamlessly execute code on a remote system.
RPC listens on TCP port 135.
RPC vulnerabilities
Endpoint mapper promiscuity
general DoS by attacking port 135
NetBIOS
a session layer file and print sharing protocol.
provides 3 services: Name service, datagram service, and session service
NetBIOS Name Service
NetBIOS name service is used for name resolution and registration (UDP port 137).
Net BIOS names are flat and limited to 16 characters. The first 15 characters are for names and the 16th character indicates the function/service.
<00> workstation
<20> server
Name advertisement
1.client broadcasts NetBIOS info 6-10 times.
2. if the name is already in use, that client sends a broadcast back indicating its use.
3. if there are no in use responses, the original client may use the name.
(a name is unique and goes to the first device that requests it)