wcl310 raiders of the elevated token

41

Upload: raymond-comvalius

Post on 21-May-2015

991 views

Category:

Documents


5 download

DESCRIPTION

You noticed that Windows 7 is much less frequent in its requests for elevation than Windows Vista. But why are some applications still requesting for elevation? Why do some applications running in the background require interaction to show their output? Is this security in Windows 7?This session will demonstrate how security related compatibility issues caused by legacy applications can be analyzed and what solutions are available to fix them yourself. The session has an overview of potential issues and what tools can enable you to take control over both legacy applications and web applications accessed by Internet Explorer 8 and 9.

TRANSCRIPT

Page 1: Wcl310 Raiders of the Elevated Token
Page 2: Wcl310 Raiders of the Elevated Token

Raiders of the Elevated Token: Understanding User Account Control and Session Isolation (repeats on May 19 at 1pm)

Raymond P.L. Comvalius MCT, MVPIndependent IT Infrastructure SpecialistThe Netherlands

WCL310

Page 3: Wcl310 Raiders of the Elevated Token

Introducing Raymond Comvalius

Independent Consultant, Trainer, and AuthorMVP: Expert Windows IT ProBlog: www.xpworld.comTwitter: @xpworldEditor for bink.nuwww.books4brains.comwww.mvp-press.com

Page 4: Wcl310 Raiders of the Elevated Token

Agenda

User Account ControlWhat is UAC?Configuring User Account ControlIntegrity LevelsFile & Registry VirtualizationHow to Control Elevation

Session 0 IsolationService ID

Page 5: Wcl310 Raiders of the Elevated Token

Disabled by Default in Windows 7 and Vista

Most Secure – Best Choice for IT

Windows 7 and Vista - Default

XP Default

Windows User Types

The AdministratorThe account named ‘administrator’

An AdministratorYour name with administrator privileges

Protected AdministratorAKA: ‘Administrator in Admin Approval Mode’

Standard UserYour name without administrator privileges

Page 6: Wcl310 Raiders of the Elevated Token

Standardizing the User Token

User-SID

Local/Builtin Group SIDs

Domain Group SIDs

Mandatory Label

Rights/Privileges

Create a token objectAct as part of the operating system Take ownership of files and other objects Load and unload device driversBack up files and directoriesRestore files and directoriesImpersonate a client after authentication Modify an object labelDebug programs

AdministratorsBackup OperatorsPower UsersNetwork Configuration Operators

Group Policy Creator OwnersSchema AdminsEnterprise AdminsDenied RODC Password Replication Group

Page 7: Wcl310 Raiders of the Elevated Token

demo

Examining the Access Token

Page 8: Wcl310 Raiders of the Elevated Token

Consent UI

The ‘face’ of UACWarns you for a User State change (AKA new token creation)Secure Desktop

Screen mode like pressing Ctrl-Alt-DelCreates screenshot of the desktop (programs keep running in the background)Keeps scripts etc. from pressing keys or clicking the mouse

Page 9: Wcl310 Raiders of the Elevated Token

Configuring UAC in the Control Panel

From the Control PanelAlways notifyDefaultDo not dim the displayNever notify

With Group PolicyMore granular controls

Page 10: Wcl310 Raiders of the Elevated Token

Configuring UAC in Group Policy

Behaviour for Standard UsersDeny AccessPrompt for Credentials

Admin Approval Mode for the built-in Administrator accountFor Administrators in Admin Approval Mode

Prompt for ConsentPrompt for CredentialsElevate without prompting

Not same as disable UAC!

Page 11: Wcl310 Raiders of the Elevated Token

demo

Configuring UAC

Page 12: Wcl310 Raiders of the Elevated Token

UIAccess Applications

Software alternatives for the mouse and keyboardFor example Remote Assistance

User Interface Accessibility integrity levelWindows always checks signature on UIAccess ApplicationsUIAccess applications must be installed in secure locationsOptionally these applications can disable the secure desktop (used with Remote Assistance)

Page 13: Wcl310 Raiders of the Elevated Token

Remote Assistance and the Secure Desktop

for non-administrative users

Page 14: Wcl310 Raiders of the Elevated Token

Integrity Levels

Mandatory Access ControlLevels are part of the ACLs and TokensLower level object has limited access to higher level objectsUsed to protect the OS and for Internet Explorer Protected Mode

System High Medium(Default)

Low

Services Administrators Standard Users

IE Protected Mode

Page 15: Wcl310 Raiders of the Elevated Token

Standardizing the User Token

User-SID

Local/Builtin Group SIDs

Domain Group SIDs

Mandatory Label

Rights/Privileges

Integrity level: High (Elevated Token)

Integrity level: Medium

Page 16: Wcl310 Raiders of the Elevated Token

IE protected mode

Only with User Account Control enablediexplore.exe runs with Low Integrity LevelUser Interface Privilege Isolation (UIPI)

Internet Explorer 8

Internet Explorer 9

Page 17: Wcl310 Raiders of the Elevated Token

IE Broker mechanismiexplore.exe

Protected-mode Broker Object

UI frame Favorites Bar Command Bar

iexplore.exe (tab process 1)

Browser Helper Objects

Toolbar Extensions

ActiveX Controls

Tab 1 Tab n

iexplore.exe (tab process n)

Browser Helper Objects

Toolbar Extensions

ActiveX Controls

Tab 1 Tab n

Low Integrity LevelProtected Mode = On

Medium Integrity LevelProtected Mode = Off

Internet/Intranet

Trusted S

ites

Page 18: Wcl310 Raiders of the Elevated Token

demo

Integrity Levels

Page 19: Wcl310 Raiders of the Elevated Token

File Virtualization

File Virtualization is a compatibility featureThe following folders and subfolders are virtualized:

%WinDir% \Program Files \Program Files (x86)

Virtual Store:%UserProfile%\AppData\Local\VirtualStore

Troubleshooting file virtualizationEvent Log: UAC-FileVirtualization

Disabling file virtualization

Page 20: Wcl310 Raiders of the Elevated Token

Registry Virtualization

Virtualizes most locations under HKLM\SoftwareKeys that are not virtualized:

HKLM\Software\Microsoft\WindowsHKLM\Software\Microsoft\Windows NT\HKLM\Software\Classes

Per user location: HKCU\Software\Classes\VirtualStoreFlag on a registry key defines if it can be virtualized

“Reg flags HKLM\Software” shows flags for HKLM\Software

Registry Virtualization is NOT logged in the EventLog

Page 21: Wcl310 Raiders of the Elevated Token

demo

File & Registry Virtualization

Page 22: Wcl310 Raiders of the Elevated Token

What defines a UAC state change

Executables that are part of the Windows OSFile NameManifestCompatibility SettingsShims

Page 23: Wcl310 Raiders of the Elevated Token

UAC for the Windows OS

Default no warning when elevating Windows OS programsExcept for:

CMD.exeRegedit.exe

Page 24: Wcl310 Raiders of the Elevated Token

What’s in a name?

Evaluation of the file name determines need for elevationSetupInstalUpdate

Disable this feature in Group Policy when needed

Page 25: Wcl310 Raiders of the Elevated Token

UAC and Manifests

Configure the need for elevation per file:asInvokerhighestAvailablerequireAdministrator

External or InternalUse mt.exe from the SDK to inject a manifestUse SigCheck.exe from SysInternals to view the manifest

Page 26: Wcl310 Raiders of the Elevated Token

demo

File names and manifests

Page 27: Wcl310 Raiders of the Elevated Token

UAC and compatibility settings

Configure the shortcutRequireAdministratorRunAsInvoker

Create a ShimNeed the Application Compatibility Toolkit Compatibility AdministratorCompatibility ModesCompatibility Fixes

Page 28: Wcl310 Raiders of the Elevated Token

demo

Compatibility Settings

Page 29: Wcl310 Raiders of the Elevated Token

Does this look familiar?

Page 30: Wcl310 Raiders of the Elevated Token

Session 0 isolation

Services run in session 0Before Vista, session 0 belonged to the consoleUsers logon to session 1 and higherIf a service interacts in session 0 you see this message

Page 31: Wcl310 Raiders of the Elevated Token

demo

Session 0 isolation

Page 32: Wcl310 Raiders of the Elevated Token

Why is this?

Page 33: Wcl310 Raiders of the Elevated Token

Services SID

A service can be a security entityWindows uses TrustedInstaller (Windows Installer Service)Only TrustedInstaller has Full Control accessTrustedInstaller = “NT Service\TrustedInstaller”TrustedInstaller installs:

Windows Service PacksHotfixesOperating System UpgradesPatches and installations by Windows Update

Page 34: Wcl310 Raiders of the Elevated Token

demo

TrustedInstaller

Page 35: Wcl310 Raiders of the Elevated Token

Yes you can!

User Account Control is no black magicUAC makes Internet Explorer a safer browserAnalyze your applicationsGet to know the tools

Whoami.exeicacls.exeSysInternalsApplication Compatibility Toolkit (ACT)Windows SDK

Page 36: Wcl310 Raiders of the Elevated Token

Related Content

WCL312: Sysinternals Primer: Autoruns, Disk2vhd, ProcDump, BgInfo and AccessChkWCL402: Troubleshooting Application Compatibility Issues with Windows 7

Find Me At The Springboard booth

Page 37: Wcl310 Raiders of the Elevated Token

Track Resources

Don’t forget to visit the Cloud Power area within the TLC (Blue Section) to see product demos and speak with experts about the Server & Cloud Platform solutions that help drive your business forward.

You can also find the latest information about our products at the following links:

Windows Azure - http://www.microsoft.com/windowsazure/

Microsoft System Center - http://www.microsoft.com/systemcenter/

Microsoft Forefront - http://www.microsoft.com/forefront/

Windows Server - http://www.microsoft.com/windowsserver/

Cloud Power - http://www.microsoft.com/cloud/

Private Cloud - http://www.microsoft.com/privatecloud/

Page 38: Wcl310 Raiders of the Elevated Token

Resources

www.microsoft.com/teched

Sessions On-Demand & Community Microsoft Certification & Training Resources

Resources for IT Professionals Resources for Developers

www.microsoft.com/learning

http://microsoft.com/technet http://microsoft.com/msdn

Learning

http://northamerica.msteched.com

Connect. Share. Discuss.

Page 39: Wcl310 Raiders of the Elevated Token

Complete an evaluation on CommNet and enter to win!

Page 40: Wcl310 Raiders of the Elevated Token

Scan the Tag to evaluate this session now on myTech•Ed Mobile

Page 41: Wcl310 Raiders of the Elevated Token