Research Article
BibTex RIS Cite

Erişim İzinlerinde Güvenlik Açığı Tespiti için Windows'un Kaynak Tabanlı İzin Mekanizmasına Tersine Bir Yaklaşım

Year 2022, Volume: 5 Issue: 2, 534 - 550, 18.07.2022
https://doi.org/10.47495/okufbed.1033540

Abstract

Kurum çalışanları görev ve sorumluluklarına göre dosyalarda saklanan bilgilerle çalışırlar. Windows, herhangi bir kullanıcı için herhangi bir iznin kaynak başına ayrı olarak ayarlanması gereken kaynak tabanlı erişim izinlerini kullanır. Bu yaklaşım, kaynak ve kullanıcı sayısı arttıkça karmaşıklaşır ve izinlerin atanmasında gözden kaçmalara neden olur. Bu nedenle, herhangi bir çalışanın herhangi bir kaynak kümesi üzerinde hangi izinlere sahip olduğunu incelemek için özel bir mekanizma gereklidir. Bu gereksinim, Windows'un kullanıcı tarafından erişilebilen kaynaklar açısından yaklaşımı tersine çevrilerek aşılmaktadır. Bu yaklaşım, herhangi bir klasörde aktif dizin kullanıcılarına verilen veya reddedilen her türlü iznin hızlı ve kolay bir şekilde incelenmesini sağlayan bir program ile gerçekleştirilmiştir. Bu şekilde yöneticiler, güvenlik açığına neden olabilecek eksik veya gözden kaçan herhangi bir atama olmadığından emin olabilir. Bu yaklaşım, diğer kaynakları incelemek ve diğer yerel veya aktif dizin nesneleri için kolaylıkla genişletilebilir.

References

  • Brown, K. The. NET Developer’s Guide to Windows Security (Microsoft Net Development Series. Addison-Wesley Professional. 2004.
  • Cone, J. M. ACACLS: A tool for examining and modifying file and directory security on NTFS volumes in a Windows NT environment. California State University, Long Beach, 2003.
  • Halsey M. Bettany, A. Restoring Files and Folder Security Settings. Windows File System Troubleshooting. Berkeley, CA: Apress 2015.
  • Internet: “SECURITY_DESCRIPTOR structure, https://docs.microsoft.com/en-us/windows/win32/api/winnt/ns-winnt-security descriptor (Accessed: 28.08.2021).
  • Internet: DACLs and ACEs, https://docs.microsoft.com/en-us/windows/win32/secauthz/dacls-and-aces (Accessed: 27.08.2021).
  • Internet: File and Folder Permissions, https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/bb727008(v=technet.10)?redirectedfrom=MSDN (Accessed: 24.08.2021).
  • Internet: File Security and Access Rights, https://docs.microsoft.com/en-us/windows/win32/fileio/file-security-and-access-rights (Accessed: 26.08.2021).
  • Internet: NTFS Overview, https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn466522(v=ws.11) (Accessed: 11.08.2021).
  • Internet: NTFS PERMISSIONS, https://www.permissionsreporter.com/ntfs-permissions (Accessed: 21.08.2021).
  • Internet: Troubleshooting Access to Files and Shared Folders, https://www.ntfs.com/ntfs-permissions-troubleshooting.htm (Accessed: 21.08.2021).
  • Mueller, J. P. Administering Windows server 2008 server core. John Wiley & Sons. 2008.
  • Stanek, W. Windows Server 2008 inside out. Pearson Education 2008.
  • Sung, K., Yoon H. Implementation of File Security Module Using on Windows. Journal of the Korea Society of Computer and Information, 2005; 10(2): 105–112.

An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection

Year 2022, Volume: 5 Issue: 2, 534 - 550, 18.07.2022
https://doi.org/10.47495/okufbed.1033540

Abstract

In organizations, employees work with information stored in files according to their duties and responsibilities. Windows uses resource-based access permissions that any permission for any user has to be set separately per resource. This approach gets complicated as the number of resources and users increase, and causes oversights in assigning permissions. Therefore, a special mechanism is required to scrutinize what permissions any employee has on any set of resources. This requirement is circumvented by reversing the Windows’ approach in terms of user-accessible resources. This approach is implemented by a program allowing quick and easy examination of any type of permissions granted or denied to active directory users on any folder. In this way, administrators can make sure there is no any missing or overlooked setting that could cause a security vulnerability. This approach can easily be extended to scrutinize other resources, and for other local or active directory objects.

References

  • Brown, K. The. NET Developer’s Guide to Windows Security (Microsoft Net Development Series. Addison-Wesley Professional. 2004.
  • Cone, J. M. ACACLS: A tool for examining and modifying file and directory security on NTFS volumes in a Windows NT environment. California State University, Long Beach, 2003.
  • Halsey M. Bettany, A. Restoring Files and Folder Security Settings. Windows File System Troubleshooting. Berkeley, CA: Apress 2015.
  • Internet: “SECURITY_DESCRIPTOR structure, https://docs.microsoft.com/en-us/windows/win32/api/winnt/ns-winnt-security descriptor (Accessed: 28.08.2021).
  • Internet: DACLs and ACEs, https://docs.microsoft.com/en-us/windows/win32/secauthz/dacls-and-aces (Accessed: 27.08.2021).
  • Internet: File and Folder Permissions, https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/bb727008(v=technet.10)?redirectedfrom=MSDN (Accessed: 24.08.2021).
  • Internet: File Security and Access Rights, https://docs.microsoft.com/en-us/windows/win32/fileio/file-security-and-access-rights (Accessed: 26.08.2021).
  • Internet: NTFS Overview, https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn466522(v=ws.11) (Accessed: 11.08.2021).
  • Internet: NTFS PERMISSIONS, https://www.permissionsreporter.com/ntfs-permissions (Accessed: 21.08.2021).
  • Internet: Troubleshooting Access to Files and Shared Folders, https://www.ntfs.com/ntfs-permissions-troubleshooting.htm (Accessed: 21.08.2021).
  • Mueller, J. P. Administering Windows server 2008 server core. John Wiley & Sons. 2008.
  • Stanek, W. Windows Server 2008 inside out. Pearson Education 2008.
  • Sung, K., Yoon H. Implementation of File Security Module Using on Windows. Journal of the Korea Society of Computer and Information, 2005; 10(2): 105–112.
There are 13 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section RESEARCH ARTICLES
Authors

Hakan Temiz 0000-0002-1351-7565

Ahmet Büyükeke

Publication Date July 18, 2022
Submission Date December 8, 2021
Acceptance Date January 10, 2022
Published in Issue Year 2022 Volume: 5 Issue: 2

Cite

APA Temiz, H., & Büyükeke, A. (2022). An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 5(2), 534-550. https://doi.org/10.47495/okufbed.1033540
AMA Temiz H, Büyükeke A. An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Osmaniye Korkut Ata University Journal of Natural and Applied Sciences. July 2022;5(2):534-550. doi:10.47495/okufbed.1033540
Chicago Temiz, Hakan, and Ahmet Büyükeke. “An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection”. Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi 5, no. 2 (July 2022): 534-50. https://doi.org/10.47495/okufbed.1033540.
EndNote Temiz H, Büyükeke A (July 1, 2022) An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi 5 2 534–550.
IEEE H. Temiz and A. Büyükeke, “An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection”, Osmaniye Korkut Ata University Journal of Natural and Applied Sciences, vol. 5, no. 2, pp. 534–550, 2022, doi: 10.47495/okufbed.1033540.
ISNAD Temiz, Hakan - Büyükeke, Ahmet. “An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection”. Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi 5/2 (July 2022), 534-550. https://doi.org/10.47495/okufbed.1033540.
JAMA Temiz H, Büyükeke A. An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Osmaniye Korkut Ata University Journal of Natural and Applied Sciences. 2022;5:534–550.
MLA Temiz, Hakan and Ahmet Büyükeke. “An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection”. Osmaniye Korkut Ata Üniversitesi Fen Bilimleri Enstitüsü Dergisi, vol. 5, no. 2, 2022, pp. 534-50, doi:10.47495/okufbed.1033540.
Vancouver Temiz H, Büyükeke A. An Inverse Approach to Windows’ Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Osmaniye Korkut Ata University Journal of Natural and Applied Sciences. 2022;5(2):534-50.

23487


196541947019414

19433194341943519436 1960219721 197842261021238 23877

*This journal is an international refereed journal 

*Our journal does not charge any article processing fees over publication process.

* This journal is online publishes 5 issues per year (January, March, June, September, December)

*This journal published in Turkish and English as open access. 

19450 This work is licensed under a Creative Commons Attribution 4.0 International License.