Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:it-security:smb-hardening [2023/11/27 22:37] – psycore | en:it-security:smb-hardening [2024/02/05 08:34] (current) – old revision restored (2024/02/04 23:30) psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | {{tag> | ||
====== SMB Hardening ====== | ====== SMB Hardening ====== | ||
===== Technical background to the SMB protocol ===== | ===== Technical background to the SMB protocol ===== | ||
- | [[wp>Server Message Block]] is susceptible to NTLM relay attacks if packets are not signed. This [[wp> | + | [[wpde>Server Message Block]] is susceptible to NTLM relay attacks if packets are not signed. This [[wpde>Man-in-the-Middle-Angriff|man-in-the-middle attack]] hijacks authentications between clients and servers. Authentication can be used to start a session on the server and steal data. |
The SMB signing explicitly assigns each initiated session to the client. This means that it is still possible to hijack the authentication, | The SMB signing explicitly assigns each initiated session to the client. This means that it is still possible to hijack the authentication, | ||
Line 19: | Line 20: | ||
===== Procedure ===== | ===== Procedure ===== | ||
- | * Step 1 - Deactivate SMBv1 | + | < |
- | | + | flowchart |
- | | + | Z[Flow] |
+ | A[Disable SMBv1] | ||
+ | B[SMB signing] | ||
+ | C(Client) | ||
+ | D(Server) | ||
+ | E(optional activation) | ||
+ | F(forced activation) | ||
+ | Z--Step 1-->A | ||
+ | | ||
+ | B-->C | ||
+ | B-->D | ||
+ | C--Step 2-->E | ||
+ | D--Step 3-->F | ||
+ | </ | ||
==== Step 1 - Deactivate SMBv1 ==== | ==== Step 1 - Deactivate SMBv1 ==== |