Hack Chaining: Attacks that become possible when a server is compromised
✍ Scribed by Chris Paget
- Book ID
- 104392023
- Publisher
- Elsevier Science
- Year
- 2004
- Tongue
- English
- Weight
- 95 KB
- Volume
- 2004
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
✦ Synopsis
the numerical value you would enter would be "1024-5000." Now add two other values, "PortsInternetAvailable" and "UseInternetPorts" to the same key. The data type for both will be REG_SZ. If you add the entry "Y" to both, the ports you have previously specified in the Ports value will be allowed. If you add the entry "N" to both, the ports specified in the Ports value will be denied (blocked).
Building in app.-based RPC security
Although most commercial Windows applications do not allow you to set parameters or make calls that affect RPC security, the potential to tighten the security of home-built Windows applications exists because of RPC application calls that are available to application programmers.
The RPC_POLICY structure supports calls such as the RPC_C_MQ_AUTHEN-TICATE call that can be used to guarantee that the process-receive queue in RPC servers permits only authenticated calls from clients. The RPC_C_MQ_ENCRYPT call can also be used to ensure that all RPC calls to the server are encrypted. These two are just a few of many of the calls that can be used to elevate RPC security in Windows applications.
Conclusion
No easy solutions for dealing with Windows RPC security issues exist.