Security Hardening Windows 7 64 bit install

Discussion in 'privacy problems' started by No_script, May 13, 2012.

Thread Status:
Not open for further replies.
  1. x942

    x942 Guest

    There's no way around that. Hash the MBR with SHA-512 or RIPEMD-160 and store the known good hashes on a CD-R.There is no way to drop malware on that MBR as any attack on the MBR would alter the hash. There are also no collisions with either of those hash algorithms (not even SHA-256 or 128 ). The down side here is that you have to check it every boot, which can be a PITA. I have to do this in my work environment (even though we have other checks such as TPM's and EFI Trusted Boot in place).

    BIOS/EFI can be (and have been) infected with malware. Is it likely? No. Not in the wild at least. I have seen tons of malware with these capabilities, the issue is that ~75-80% of the time they fail. Why? Because even if the brand of BIOS is the same more times then not there are differences in software/hardware that prevent the malware from infected that other computer. About a year ago I did some research into BIOS malware and did find, surprisingly, that even the sophisticated attacks were hit and miss. One example that comes to mind is Two Acer laptops I tested on with the exact same install (Win 7) and exact same hardware. One had and updates BIOS and the other didn't. The updated one was not infected (failed to write to the BIOS and no changes occured) while the other one was.

    So unless you are targeted by some one with a lot (and I mean a LOT) of time and money you don't need to worry about BIOS attacks as much. Keeps out all malware from the system and maintain physical control and you are fine. My rule of thumb is: If the devices is MIA and "magically" reappears, Wipe the HDD and Sell the hardware just to be safe. Even if it was just stolen and the police retrieve it for you. Wipe the HDD and sell (or downgrade it to non-sensitive data) it.
     
  2. Pinga

    Pinga Registered Member

    Joined:
    Aug 31, 2006
    Posts:
    1,420
    Location:
    Europe
  3. EncryptedBytes

    EncryptedBytes Registered Member

    Joined:
    Feb 20, 2011
    Posts:
    449
    Location:
    N/A
    Well put, to piggy back off x942's comment, you need to keep your risk matrix within the scope of reality. While it is good to know what is out there and what is possible, not everything will be applicable to someone or an organization. You need to take a step back and think what has the greatest chance of compromising your security and protect against that. Men in black descending from helicopters into your computer room to install stuxnet style BIOS virus' should be low on your threat scale.


    This topic was created before 3.0 was released.
     
  4. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    What are the differences in EMET 3.0?
    Now i'll have to update my other PC's. :D
     
  5. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,957
    Location:
    USA
    Good thread, No_script.
    Hi EB. What about something between simple tips and all the way down the rabbit hole? Forex, No_script's suggestions... "Disable superfetch and hibernation? Disable anonymous login? Encrypt the page file?".
    Good place to start?
    Thanks for all the details! :thumb:
     
  6. Serapis

    Serapis Registered Member

    Joined:
    Nov 15, 2009
    Posts:
    241
    It is a very informative thread with many experts, we are lucky to have such people here with us.

    @ x942

    Lets say that an advanced adversary is out of the picture, how do you hash your MBR?

    Do you know if setting BIOS passwords uses encryption to protect its settings?

    Thats good practice to learn for most common cases. But for all purposes this confirms that MIA devices are a liability that cannot be trusted any more.


    @ EncryptedBytes

    I understand that such scenarios are very far fetched but its definitely interesting and cool to go all the way down the rabbit hole with usage guidelines, just like the big boys. :cool:

    Thank you for chipping in this topic.

    You've mentioned that the guest OS should be kept updated, but why should you bother if you're inside a vm? I understand if you're using them for secure uses you would need to have them patched so they don't become compromised, just like with a regular machine. But otherwise what's the benefit of keeping guests updated if the host is all I am concerned about?
     
  7. No_script

    No_script Registered Member

    Joined:
    May 12, 2012
    Posts:
    97
    you wont know if your infected with the next stuxnet, not for a good 2-3 years. Anti virus/malware/firewalls are just plain rubbish in protecting your system. Look at all the botnets, ZeuSS is 3 years old and still infecting people.


    I got fully r00ted on the weekend searching for hosting in russia (serves me right , yeah i know) I hit something I shouldn't, haven't something like that before . I Think it was loading from RAM chips, tell me how we are meant to deal with that?
     
  8. Serapis

    Serapis Registered Member

    Joined:
    Nov 15, 2009
    Posts:
    241
    If its a RAM resident virus, it should be gone with a simple reboot provided that nothing was written to the disk in anyway. Please don't derail this thread asking about specific virus cleanup help.

    in your case you'd be better off nuking the drive and reinstalling everything since there is no way to be sure that you are clean otherwise.
     
  9. EncryptedBytes

    EncryptedBytes Registered Member

    Joined:
    Feb 20, 2011
    Posts:
    449
    Location:
    N/A
    Yes, even though you are going to wipe and restore the guest after each use, the image can still get compromised during a browsing session as a normal host would. This would put any other computers on your LAN at potential risk of infection, given their own patching history and the type of infection the guest has. While the guest is a black hole so to speak for malware, keeping it updated and also establishing quick firewall rules mitigates this risk.
     
  10. No_script

    No_script Registered Member

    Joined:
    May 12, 2012
    Posts:
    97
    Sorry for derailing the thread.

    Is it ok to delete file write permissions? delete firmware update for administrators? block anonymous access?
     
  11. nuphorce

    nuphorce Registered Member

    Joined:
    May 13, 2012
    Posts:
    12
    Are you still able post the XP guide?
     
  12. lodore

    lodore Registered Member

    Joined:
    Jun 22, 2006
    Posts:
    9,065
    since all the antivirus companies have detected ZeuSS for such a long time I hardly think its their fault people still havent removed it from their systems. You also cant blame microsoft for people not applying patches they created years ago to sort out vulnerabilities. how many people still have java 5, acrobat reader 7, flash player 9, and run with admin rights on windows xp along with norton 2005 without an active subscription? the problem with oems shipping 6 month trials of security software is that not everyone knows its only 6 months and think they are protected.
     
    Last edited: May 27, 2012
  13. AlexC

    AlexC Registered Member

    Joined:
    Apr 4, 2009
    Posts:
    1,288
    That's totally true lodore.

    About oems shipping 6 month trials of security software, fortunately seems that Windows 8 will have Windows Defender (formerly MSE) active by default (or maybe not? maybe Windows Defender will be deactivated to allow the 6 month trials of other security products?)
     
    Last edited: May 27, 2012
  14. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,321
    Location:
    AmstelodamUM
    Do you also disable Teredo?
     
  15. EncryptedBytes

    EncryptedBytes Registered Member

    Joined:
    Feb 20, 2011
    Posts:
    449
    Location:
    N/A
    I am slowly making it, my real job comes first and it has been a busy month.


    Yes you can and you should if you know for certain that tunneling 6over4 adapters/interfaces will never be used. That same rule should be applied to any services or features you know you will not need or require. If you feel you don't want to nuke such v6 services you can additionally opt to filter the v6 traffic through your Windows 7 firewall and control inbound/outbound there. Hope that helps :cool: :thumb:

    I realize I didn't go too deep into network configurations/services. Thanks for brining up the question.

    [edit] To clarify on those firewall rules: You could block incoming and outgoing IPv6 protocol 41 (for ISATAP and 6to4) and UDP 3544 (for Teredo) traffic
     
    Last edited: May 30, 2012
  16. Tomwa

    Tomwa Registered Member

    Joined:
    Feb 3, 2010
    Posts:
    165
    I know this thread is a little old but I have information that may help those who have read this thread.

    All the MSS entries are enabled in the Group Policy Editor by installing the Microsoft Security Compliance Manager. However, as this installs SQL Express (Which I didn't want as it was unnecessary and expanded the attack surface of my network) you may not want to install it. If you download the installer you can extract the LocalGPO.msi (Which is what adds the MSS entries to the Group Policy Editor).

    1. Simply extract "Security_Compliance_Manager_Setup.exe" (7zip or winRAR work fine) to a new folder

    2. Extract the "data.cab" to a new folder.

    3. In the new folder (from data.cab) you will see a GPOMSI file. Rename this file to LocalGPO.msi (or just add the .msi extension).

    4. Install the new MSI installer

    5. Open a command prompt in the install directory for LocalGPO (Normally C:\Program Files\LocalGPO on 32-bit systems, C:\Program Files (x86)\LocalGPO on 64-bit systems).

    6. Execute the following command: "cscript.exe LocalGPO.wsf /ConfigSCE" without the quotes.

    7. Open the Group Policy Editor and enjoy your SQL free policy management.
     
  17. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,321
    Location:
    AmstelodamUM
    Perhaps a hint under Physical security regarding IPMI/'KVM via lan' can be useful, if only as a reminder for particular configs?
     
  18. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    All of that is true, but the MBR is far from the only threat. You've got BIOS hacking, replacing the BIOS completely, tampering with the drives, keyboard, etc. You've go hardware keyloggers, cameras, and other nefarious tricks a well funded and sophisticated attacker could use (like the FBI -- who has used these tricks before to bring mafia bosses down).

    It really depends on your threat model. If you are at a Fortune 100 CEO and have sophisticated industrial espianoge going on, you might want more protection. If you are a mafia kingpin, you probably want more protection. If you are an average user, using TPM or UEFI is probably good enough.

    When the CEO of Symantec went to China, he blogged that the CIA/NSA told him to not carry his personal laptop. They told him to bring a disposable laptop with minimal information on it. And they told him to weigh the laptop before leaving so he could detect if anyone planted extra hardware on it (that's the first I had heard of weighing, but it's what they recommended).

    But the bottom line is if the machine is out of your sight for any extended period of time, you cannot trust it. It depends on a lot of variables, such as how much physical security you have around the machine (do you lock it in a safe, and if so, how strong is that safe?) And, again, it depends on how sophisticated your potential adversaries are.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.