SlideShare a Scribd company logo
The Stuff You Want
• The basic unit of security management in Windows is a
  securable object. A securable object is some type of object
  that can have permissions applied to it. Different types of
  securable objects include:
    •   Files
    •   Directories
    •   Services
    •   Active Directory objects
    •   Registry keys
    •   Threads
    •   Firewall Ports
    •   Kernel objects
    •   Processes
    •   Windows stations and desktops

2012/09/11                Compiled by Liezel Grobler - LU3 DNIS   2
• All securable objects have one thing in common: they
  have a security descriptor (SD) associated with them.
  The SD is the construct that contains all the security
  information associated with the object. The control field
  contains a number of flags that describe the nature of the
  security descriptor.
• The following are pointers in a security descriptor:
    •   Owner
    •   Group
    •   SACL
    •   DACL


2012/09/11          Compiled by Liezel Grobler - LU3 DNIS   3
• Three types of access control lists:
• Discretionary access control list (DACL) – Records
  permissions on an object and can be managed by the
  administrator or the object owner.
• System access control list (SACL) – Is identical to
  DACLs in structure. SACLs control which access
  attempts gets audited.
• Mandatory access control list (MACL) – Records
  permissions on an object. Is not managed by any given
  user. All data receives a label specifying its sensitivity


2012/09/11          Compiled by Liezel Grobler - LU3 DNIS      4
• The access control list entry (ACE) defines the subject
  and what permissions that subject has to the object.
• ACLs can be inherited from parent objects to child
  objects.
• Generic permissions:
    •   GR – Generic Read
    •   GW – Generic Write
    •   GX – Generic Execute
    •   GA – Combination of GR, GW, and GX




2012/09/11              Compiled by Liezel Grobler - LU3 DNIS   5
• When a user logs on to a Windows computer, the
  operating system creates a token for the user. This token
  contains a statement of who the user-subject-is, what
  group it is a member of, and what privileges it has.
• The log-on type denoted by several SIDs in the security
  token is: The LOCAL SID, which means the user logged
  on to a terminal physically connected to the computer.
  LOGON SID, which is an identifier for the log-on session
  assigned to this user. INTERACTIVE SID, which states
  that the user is logged on interactively to the computer.
• When a process attempts to access a securable
  object, the operating system compares the access token
  to first the DACL and then the SACL on the object.
2012/09/11         Compiled by Liezel Grobler - LU3 DNIS   6
• The comparison with the DACL focuses on three
  factors:
    • The requested access
    • The SIDs in the token
    • The ACEs in the object’s DACL
• ACEs should be stored in an ACL in a defined order:
    •   Noninherited deny ACEs
    •   Noninherited allow ACEs
    •   Inherited deny ACEs
    •   Inherited allow ACEs



2012/09/11               Compiled by Liezel Grobler - LU3 DNIS   7
• Change ACLs (cacls) is built into Windows and is a
  command-line tool.
• Icacls include advanced features:
    •   Saving and restoring ACLs
    •   Substituting SIDs
    •   Changing owner
    •   Resetting ACLs
    •   Set integrity level
    •   View SDDL
    •   Remove inherited permissions
    •   Find all permissions for a particular user
• SC, the command-line service configuration utility, can show
  and manage ACLs on services.

2012/09/11                   Compiled by Liezel Grobler - LU3 DNIS   8
• Subinacl is the only tool that can manage
  permissions on all these objects:
• Files
• Services
• Printers
• Processes
• Shares
• Registry keys
• Kernel objects
• SAM objects

2012/09/11        Compiled by Liezel Grobler - LU3 DNIS   9
• Major access control changes in Windows Server 2008:
    •   TrustedInstaller Permissions
    •   Network Location SIDs
    •   File System Name Space Changes
    •   Power User Permissions Removed
    •   OWNER_RIGHT and Owner Rights
• User rights and privileges are different constructs. User
  rights only govern the methods by which a user can log on.
  Privileges determine what users can do after they have logged
  on.
• Authorization Manager (AZMAN) is used to allow third-party
  developers to implement their own access control
  mechanisms. Developers can leverage AZMAN to implement
  role-based access control (RBAC) system.
2012/09/11              Compiled by Liezel Grobler - LU3 DNIS   10

More Related Content

Similar to Chapter 3 dnis

12-OS-security-workshop.pdf
12-OS-security-workshop.pdf12-OS-security-workshop.pdf
12-OS-security-workshop.pdf
Khalil BOUKRI
 
Lucene solrrev documentlevelsecurity_rajanimaski_final
Lucene solrrev documentlevelsecurity_rajanimaski_finalLucene solrrev documentlevelsecurity_rajanimaski_final
Lucene solrrev documentlevelsecurity_rajanimaski_final
Rajani Maski
 
A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...
lucenerevolution
 
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OSHacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OS
EC-Council
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot
 
Webinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesWebinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security Features
MongoDB
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
Security Bootcamp
 
Android System Architecture And  Pen-testing of Android applications
Android System Architecture  And  Pen-testing of Android applications Android System Architecture  And  Pen-testing of Android applications
Android System Architecture And  Pen-testing of Android applications
yavuzwb
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
Vincent Giersch
 
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
Will Schroeder
 
SQL Queries on Smalltalk Objects
SQL Queries on Smalltalk ObjectsSQL Queries on Smalltalk Objects
SQL Queries on Smalltalk Objects
ESUG
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdf
SouvikRoy114738
 
Active Directory
Active DirectoryActive Directory
Active Directory
rainrjcahili
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
MeriemBalhaddad
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
 
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLNoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
DATAVERSITY
 
Everything you need to know about containers security
Everything you need to know about containers securityEverything you need to know about containers security
Everything you need to know about containers security
Jose Manuel Ortega Candel
 
Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017
Jose Manuel Ortega Candel
 

Similar to Chapter 3 dnis (20)

12-OS-security-workshop.pdf
12-OS-security-workshop.pdf12-OS-security-workshop.pdf
12-OS-security-workshop.pdf
 
6425 c 01
6425 c 016425 c 01
6425 c 01
 
Lucene solrrev documentlevelsecurity_rajanimaski_final
Lucene solrrev documentlevelsecurity_rajanimaski_finalLucene solrrev documentlevelsecurity_rajanimaski_final
Lucene solrrev documentlevelsecurity_rajanimaski_final
 
A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...A Novel methodology for handling Document Level Security in Search Based Appl...
A Novel methodology for handling Document Level Security in Search Based Appl...
 
Mcts chapter 4
Mcts chapter 4Mcts chapter 4
Mcts chapter 4
 
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OSHacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OS
 
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQLKangaroot EDB Webinar Best Practices in Security with PostgreSQL
Kangaroot EDB Webinar Best Practices in Security with PostgreSQL
 
Webinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security FeaturesWebinar: MongoDB 2.6 New Security Features
Webinar: MongoDB 2.6 New Security Features
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
Android System Architecture And  Pen-testing of Android applications
Android System Architecture  And  Pen-testing of Android applications Android System Architecture  And  Pen-testing of Android applications
Android System Architecture And  Pen-testing of Android applications
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
 
SQL Queries on Smalltalk Objects
SQL Queries on Smalltalk ObjectsSQL Queries on Smalltalk Objects
SQL Queries on Smalltalk Objects
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdf
 
Active Directory
Active DirectoryActive Directory
Active Directory
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
 
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQLNoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
 
Everything you need to know about containers security
Everything you need to know about containers securityEverything you need to know about containers security
Everything you need to know about containers security
 
Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017Testing Docker Security Linuxlab 2017
Testing Docker Security Linuxlab 2017
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Chapter 3 dnis

  • 2. • The basic unit of security management in Windows is a securable object. A securable object is some type of object that can have permissions applied to it. Different types of securable objects include: • Files • Directories • Services • Active Directory objects • Registry keys • Threads • Firewall Ports • Kernel objects • Processes • Windows stations and desktops 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 2
  • 3. • All securable objects have one thing in common: they have a security descriptor (SD) associated with them. The SD is the construct that contains all the security information associated with the object. The control field contains a number of flags that describe the nature of the security descriptor. • The following are pointers in a security descriptor: • Owner • Group • SACL • DACL 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 3
  • 4. • Three types of access control lists: • Discretionary access control list (DACL) – Records permissions on an object and can be managed by the administrator or the object owner. • System access control list (SACL) – Is identical to DACLs in structure. SACLs control which access attempts gets audited. • Mandatory access control list (MACL) – Records permissions on an object. Is not managed by any given user. All data receives a label specifying its sensitivity 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 4
  • 5. • The access control list entry (ACE) defines the subject and what permissions that subject has to the object. • ACLs can be inherited from parent objects to child objects. • Generic permissions: • GR – Generic Read • GW – Generic Write • GX – Generic Execute • GA – Combination of GR, GW, and GX 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 5
  • 6. • When a user logs on to a Windows computer, the operating system creates a token for the user. This token contains a statement of who the user-subject-is, what group it is a member of, and what privileges it has. • The log-on type denoted by several SIDs in the security token is: The LOCAL SID, which means the user logged on to a terminal physically connected to the computer. LOGON SID, which is an identifier for the log-on session assigned to this user. INTERACTIVE SID, which states that the user is logged on interactively to the computer. • When a process attempts to access a securable object, the operating system compares the access token to first the DACL and then the SACL on the object. 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 6
  • 7. • The comparison with the DACL focuses on three factors: • The requested access • The SIDs in the token • The ACEs in the object’s DACL • ACEs should be stored in an ACL in a defined order: • Noninherited deny ACEs • Noninherited allow ACEs • Inherited deny ACEs • Inherited allow ACEs 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 7
  • 8. • Change ACLs (cacls) is built into Windows and is a command-line tool. • Icacls include advanced features: • Saving and restoring ACLs • Substituting SIDs • Changing owner • Resetting ACLs • Set integrity level • View SDDL • Remove inherited permissions • Find all permissions for a particular user • SC, the command-line service configuration utility, can show and manage ACLs on services. 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 8
  • 9. • Subinacl is the only tool that can manage permissions on all these objects: • Files • Services • Printers • Processes • Shares • Registry keys • Kernel objects • SAM objects 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 9
  • 10. • Major access control changes in Windows Server 2008: • TrustedInstaller Permissions • Network Location SIDs • File System Name Space Changes • Power User Permissions Removed • OWNER_RIGHT and Owner Rights • User rights and privileges are different constructs. User rights only govern the methods by which a user can log on. Privileges determine what users can do after they have logged on. • Authorization Manager (AZMAN) is used to allow third-party developers to implement their own access control mechanisms. Developers can leverage AZMAN to implement role-based access control (RBAC) system. 2012/09/11 Compiled by Liezel Grobler - LU3 DNIS 10