View on GitHub

network-security-checklist

A checklist for defending private or corporate networks.

Network Security Checklist

Abstract

This is a checklist that may help you defending your network against cyber attacks.

All OS

You should match this section against all operating systems.

Windows

Linux

Networking

Explanations

IPv6

When implementing IPv6 on a network, remember a basic principle: you need to configure security for IPv4 and IPv6 separately. For example, if ACL is deployed on the router for IPv6, it does not apply for IPv6.

Configure ACL (deny all pings).

(config)#access-list 100 deny icmp any any echo

Apply ACL to interface GigabitEthernet 0/0. Note how you have to apply ACL to both IPv4 and IPv6 on both directions.

(config)#ip access-group 100 in
(config)#ip access-group 100 out
(config)#ipv6 access-group 100 in
(config)#ipv6 access-group 100 out

PowerShell V2

Even if powershell is disabled TODO

NTLM and Kerberos

NTLM is how Windows stores passwords and authenticates. It uses MD4 to store passwords. Network authentication uses the hash, but not the original password. This makes NTLM vulnerable to NTLM relaying. By relaying the authentication request to a rogue server, the target machine will attempt to log in into the server, without verifying the identity of the server. Then, the rogue server can relay the authentication requests to a target server, thus gaining access to the server.

Weaknesses

NTLM Kerberos
Typically mix of NTLM v1 & v2 Supported encryption types
Encryption: DES or MD4 or HMAC-MD5 RC4 Encryption = NTLM Hash
No mutual authentication Compromise of TLK = compromise of Kerberos
Hash used behind the scenes Stolen credentials reusable until ticket expires
Stolen credentials reusable until password changed TGS PAC validation not typically performed
Credentials can be “leaked” via web browser  

NLM Attacks

Services that NTLM will attempt to login automatically:

Kerberos Attacks

WPAD

By default, Windows detects web proxies and tries to log in with the currently-logged-in user’s credentials. This might cause leakage of HTTP credentials, and should be disabled.

RODC

Supplemental Information

PowerSploit

PoewrSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.

Active Directory

Groups with AD Admin Rights

Group Policy

AD Asset Discovery

Microsoft Password & Active Directory