𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Hack Chaining: Attacks that become possible when a server is compromised

✍ Scribed by Chris Paget


Book ID
104392023
Publisher
Elsevier Science
Year
2004
Tongue
English
Weight
95 KB
Volume
2004
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


the numerical value you would enter would be "1024-5000." Now add two other values, "PortsInternetAvailable" and "UseInternetPorts" to the same key. The data type for both will be REG_SZ. If you add the entry "Y" to both, the ports you have previously specified in the Ports value will be allowed. If you add the entry "N" to both, the ports specified in the Ports value will be denied (blocked).

Building in app.-based RPC security

Although most commercial Windows applications do not allow you to set parameters or make calls that affect RPC security, the potential to tighten the security of home-built Windows applications exists because of RPC application calls that are available to application programmers.

The RPC_POLICY structure supports calls such as the RPC_C_MQ_AUTHEN-TICATE call that can be used to guarantee that the process-receive queue in RPC servers permits only authenticated calls from clients. The RPC_C_MQ_ENCRYPT call can also be used to ensure that all RPC calls to the server are encrypted. These two are just a few of many of the calls that can be used to elevate RPC security in Windows applications.

Conclusion

No easy solutions for dealing with Windows RPC security issues exist.