Microsoft Windows Security Architecture Flashcards

1
Q

Security Architecture - Security Reference Monitor:

A

The SRM defines the access token data structure, performs access control on objects, manipulates privileges and emits audit records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Architecture - Local Security Authority:

A

The LSA subsystem is a user-mode process and maintains the local system security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Architecture - LSASS Policy Database:

A

Loaded from the registry, includes Active Directory and server trust settings and access rights, will also contain domain logon keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Architecture - Security Accounts Manager:

A

The SAM service manages local user and group names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Architecture - Active Directory:

A

When running, operates in the LSASS process alongside the SAM and LSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Architecture - Authentication Packages:

A

Extensions to basic authentication mechanisms, will run in the LSASS context and act as an authentication provider to the remainder of LSASS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security Architecture - Winlogon:

A

The interactive login user-mode component responding to the System Attention Sequence (SAS) and creating a user’s first process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security Architecture - LogonUI:

A

The Logon User Interface is a user-mode process presenting a visual interface for authentication, but interfaces with different credential providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Architecture - Credential Providers:

A

COM objects running within the LogonUI process once Winlogon has triggered LogonUI after a SAS event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Architecture - Netlogon:

A

Sets up a secure channel to an Active Directory or legacy Domain Controller for interactive authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Architecture - KSecDD:

A

The Kernel Security Device Driver is a library of components implementing local procedure call interfaces to other kernel-mode security components, e.g. The Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The object-based design of Windows allows handling of most entities within the operating system as objects…

A

This includes all system resources exposed to user mode. Objects are accessed via the Object Manager, which maintains name spaces and handles, the latter on a per-process basis. Any access requires the specification of desired access privileges on handle creation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows Security Identifiers (SIDs) are unique…

A

On installation each machine is issued with a SID. Accounts and other derivative entities are then derived from this source SID. N case of domain accounts, the relative security identifiers (RIDs) are based on that of the domain controller. Some RIDs are pre-defined for special roles and groups, these are well known SIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Machines can be cloned, although for proper operations…

A

The SID will need to be adjusted after cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Winlogon creates a unique ephemeral SID for each interactive login session, called a logon SID…

A

This can be used to generate a unique access token, which is then tied to the interactive window station and desktop. The SID for a logon session is fixed, but the RID is randomly generated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SIDs are also used to specify integrity levels. These range from…

A

Untrusted via Low, Medium to High and System

17
Q

Tokens exist to identify security contexts of processes and threads and also include session identifiers, privileges, group, accounts, integrity levels and the UAC virtualisation state…

A

Initial tokens are created on logon and are inherited but can be modified or filtered. In addition to inheritance, Windows frequently uses Impersonation to temporarily change security contexts

18
Q

Auditing Mechanism - The Object Manager:

A

May generate audit records

19
Q

Auditing Mechanism - Kernel-Level Code:

A

Can always generate audit records

20
Q

Auditing Mechanism - User-Level Code:

A

Can generate audit records, but must have the appropriate privilege set in an object’s SACL

21
Q

Audit behaviour is then controlled by the Local Security Policy maintained by the LSASS and executed by the SRM, the SRM…

A

Generates audit events and sends them to LSASS via ALPC

22
Q

Auditing Mechanism - The LSASS receives…

A

Audit records, formats and amends them and forwards them to the Event Logger

23
Q

Virtualisation can be considered as the…

A

Construction of an isomorphism from guest to host state

24
Q

Hardware must assist VM monitor in insulating virtual machines…

A

Any immediate VM access to physical hardware would allow VM to violate isolation boundaries

25
Q

Virtualisation Requirements:

A
  • All access to the virtual system instruction system architecture by the guest must be emulated by a monitor in software
  • Guest system state must be kept in memory
  • Guest system instructions must be implemented as functions within the VM monitor
26
Q

Virtualisation Approaches - Objective of CPU Virtualisation:

A
  • Process all unprivileged instructions unchanged

* Emulate all privileged instructions

27
Q

Virtualisation Approaches - Trap and Emulate:

A
  • Privileged instructions from guest VM cause privileged state trap
  • A processor is only virtualisable if all instructions either execute normally or if privileged, trap.
28
Q

Virtualisation Approaches - Problems with Trap and Emulate:

A
  • Not every instruction set architecture supports this
  • Cost of traps can be high, particularly in ISAs requiring “deep” pipelines
  • The VM monitor requires use of a privileged level for trapping
29
Q

Virtualisation Approaches - Binary Translation:

A
  • Code is analysed a priori or on the fly and translated
  • Privileged instructions are substituted with code causing the desired effect in the mapped state: This does not affect the state of the physical hardware
30
Q

Virtualisation Approaches - Challenges for Binary Translation:

A
  • Complex ISAs have internal state which needs to be maintained: Particularly problematic for viewing translation cache indices not normally visible to software
  • Synchronisation of PC upon interrupts
  • Handling of self-modifying code
31
Q

Virtualisation generally provides the guest system with:

A
  • Virtual memory environment
  • Device drivers or virtual devices, multiplexing physical hardware or emulating devices
  • Images of one or more file systems
32
Q

Interactions among the host system, the virtualised system and device drivers may result in behaviour that is substantially different from that of a direct instantiation. Counter-forensics mechanisms make use of this to…

A

Detect if they are running inside a sandbox. Common problems also for forensics of cloud-based systems including modern PaaS environments

33
Q

Microsoft Hyper-V…

A
  • Virtualisation requires adaptation to the given hardware implementation via the HAL layer as access is now directed via Hyper-V
  • Support is provided for operating efficiently as hypervisor - in this case a Windows instance will operate as a parent, offering virtualisation services (VSP) to clients (VSC)
  • The VMbus allows efficient inter-VM communication, but this can also be misused
  • Optimisations allow the detection of running in a client partition and adapting behaviour according to avoid forcing the hypervisor to emulate inefficient behaviour
  • This has been the major construction site for the server code
34
Q

VMWare:

A

A common example of direct virtualisation supporting a number of client operating systems and running on a number of different host platforms. Some problems arise, e.g. From non-persistent virtual machines or branches of other machines

35
Q

Xen:

A

An example of a paravirtualised environment: As this has explicit client-side support, it is trivial to detect by anti-forensics software. Can also run on top of a regular operating system with appropriate hardware support