SlideShare a Scribd company logo
1 of 16
Download to read offline
Managing Local Administrator
Passwords with LAPS
2015 PENN STATE SECURITY CONFERENCE
DAN BARR – DRB45@PSU.EDU
SYSTEMS ADMINISTRATOR, APPLIED RESEARCH LABORATORY
10/14/2015 PENN STATE SECURITY CONFERENCE
The Shared Password Threat
Shared passwords are one vector used in Pass-the-Hash attacks
It only takes one compromised client to effectively compromise every system using the same
local Administrator password
Makes lateral movement within a “trusted” network trivial
Even if the clear text password isn’t compromised, you’re still in big trouble
So, how do we manage passwords on a large # of systems?
◦ And rotate them often?
◦ And control who can access them?
◦ Without spending a small fortune on additional complex infrastructure or products?
10/14/2015 PENN STATE SECURITY CONFERENCE
What is Pass-the-Hash (PtH)?
(The short, short version)
Credential replay attack
Attacker does not need the cleartext password!
Hashes can be harvested from:
◦ Memory (lsass.exe process)
◦ Local SAM database (local accounts and cached AD credentials)
◦ NTLM traffic sniffing (but requires brute-force since hash is encrypted over the wire)
NTLM and Kerberos (via ticket replay/forwarding) are both vulnerable
Compromised Client Admin Client Clients Servers Databases
Attacker
10/14/2015 PENN STATE SECURITY CONFERENCE
More on PtH
For more in-depth information and a demo of Pass-the-Hash:
Security Features of OneForest Active Directory Deployment
Keith Brautigam & Jake DeSantis
Thursday at 2:50pm
10/14/2015 PENN STATE SECURITY CONFERENCE
What is LAPS?
•Local Administrator Password Solution
•Free tool made public by Microsoft in May 2015
•Formerly only available to MS Premier Support agreement holders
•Securely manages unique, random local Administrator passwords on managed systems
•Completely implemented using AD & Group Policy, no additional infrastructure needed
•Developed due to frequency of shared admin passwords used as a primary attack vector in
customer security incidents handled by Microsoft
•Does NOT eliminate PtH, just reduces the impact
10/14/2015 PENN STATE SECURITY CONFERENCE
How does it work?
•Schema extension adds two attributes to Computer objects:
• ms-Mcs-AdmPwd: Confidential, RODC Filtered
• ms-Mcs-AdmPwdExpirationTime
•Client-side GPO extension (DLL) installed via MSI
•Managed via simple GUI, PowerShell,
or native AD management tools
Active Directory
Group Policy Framework
AdmPwd.dll
LAPS UI
PowerShell
Group Policy Editor
AD Computer Account
ms-Mcs-AdmPwd
ms-Mcs-AdmPwdExpirationTime
10/14/2015 PENN STATE SECURITY CONFERENCE
LAPS Features & Requirements
FEATURES
•Passwords stored centrally in AD
•Optional audit/debug logging to client’s
Security Event Log
•Define password parameters: length,
complexity, age
•Force a password reset
•GUI, PowerShell, or native AD tools for
management
REQUIREMENTS
AD: At least Server 2003 SP1
Officially-supported clients:
◦ Vista with current SP & above
◦ Server 2003 SP2 & above
Unofficially works on XP
10/14/2015 PENN STATE SECURITY CONFERENCE
LAPS Process
GP Refresh
Check expiration
timestamp in AD
attribute
If expired,
generate new
password based
on configured
rules
Store new
password in AD
attribute and
update expiration
timestamp
If successful,
update local
account PW
10/14/2015 PENN STATE SECURITY CONFERENCE
LAPS Security Considerations
Kerberos encryption used in transit
Use AD object access auditing to track
password retrievals
Currently only handles one account per client
◦ Does not have to be built-in Administrator
Password is stored in clear text
◦ Encryption at rest would require key exchange
(symmetric) or PKI (assymetric)
◦ ACLs adequately protect
◦ Maintains the solution’s simplicity
◦ Compromised AD means game over anyway
AD attribute is marked confidential, need one
of the following permissions to read it:
◦ “Full Control” on computer object, OR
◦ “All Extended Rights” on computer object, OR
◦ “Control Access” on ms-Mcs-AdmPwd attribute
Not replicated to RODCs
Not exposed in audit logging
10/14/2015 PENN STATE SECURITY CONFERENCE
Group Policy Settings
10/14/2015 PENN STATE SECURITY CONFERENCE
LAPS UI
10/14/2015 PENN STATE SECURITY CONFERENCE
PowerShell
Module “AdmPwd.PS”
Cmdlets:
◦ Find-AdmPwdExtendedRights
◦ Get-AdmPwdPassword
◦ Reset-AdmPwdPassword
◦ Set-AdmPwdAuditing
◦ Set-AdmPwdComputerSelfPermission
◦ Set-AdmPwdReadPasswordPermission
◦ Set-AdmPwdResetPasswordPermission
◦ Update-AdmPwdADSchema
10/14/2015 PENN STATE SECURITY CONFERENCE
Typical Deployment Workflow
Extend AD
Schema
Review/Revoke
Extended
Rights
Add Machine
Rights (SELF)
Add User
Rights and
Auditing
Apply Group
Policy Settings
Deploy Client
Side Extension
10/14/2015 PENN STATE SECURITY CONFERENCE
Deployment Workflow - PowerShell
Extend AD Schema
◦ Update-AdmPwdADSchema
Audit/remove undesired extended rights
◦ Find-AdmPwdExtendedRights -Identity <OU Name> | Format-Table
Add Machine rights (SELF permission to update new attributes)
◦ Set-AdmPwdComputerSelfPermission -OrgUnit <OU Name>
Add User rights to read PW or force reset
◦ Set-AdmPwdReadPasswordPermission -OrgUnit <OU Name> -AllowedPrincipals
<users/groups>
◦ Set-AdmPwdResetPasswordPermission -OrgUnit <OU Name> -AllowedPrincipals
<users/groups>
Enable access auditing
◦ Set-AdmPwdAuditing -OrgUnit <OU Name> -AuditedPrincipals <users/groups/Everyone>
10/14/2015 PENN STATE SECURITY CONFERENCE
Other PtH Mitigations
Upgrade clients – lots of kernel-level hardening in newer (Win8+) versions.
Limit client-to-client communications
Disable caching of AD credentials where possible
Limit use/scope of privileged accounts – least user access
◦ Use hardened administrative stations & “jump” servers
◦ Offers fewer chances to harvest a privileged hash
Limit debug privileges (often used to access memory of protected processes)
10/14/2015 PENN STATE SECURITY CONFERENCE
THANK YOU!
Dan Barr – drb45@psu.edu
Reminder: Security of OneForest AD Deployment, 2:30pm tomorrow
Keith Brautigam & Jake DeSantis, ITS Identity Services
10/14/2015 PENN STATE SECURITY CONFERENCE

More Related Content

What's hot

XSS and CSRF with HTML5
XSS and CSRF with HTML5XSS and CSRF with HTML5
XSS and CSRF with HTML5
Shreeraj Shah
 
C2 Matrix A Comparison of Command and Control Frameworks
C2 Matrix A Comparison of Command and Control FrameworksC2 Matrix A Comparison of Command and Control Frameworks
C2 Matrix A Comparison of Command and Control Frameworks
Jorge Orchilles
 

What's hot (20)

LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
 
(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory Pwnage
 
AllDayDevOps ZAP automation in CI
AllDayDevOps ZAP automation in CIAllDayDevOps ZAP automation in CI
AllDayDevOps ZAP automation in CI
 
[Pgday.Seoul 2018] 이기종 DB에서 PostgreSQL로의 Migration을 위한 DB2PG
[Pgday.Seoul 2018]  이기종 DB에서 PostgreSQL로의 Migration을 위한 DB2PG[Pgday.Seoul 2018]  이기종 DB에서 PostgreSQL로의 Migration을 위한 DB2PG
[Pgday.Seoul 2018] 이기종 DB에서 PostgreSQL로의 Migration을 위한 DB2PG
 
Abusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get itAbusing Microsoft Kerberos - Sorry you guys don't get it
Abusing Microsoft Kerberos - Sorry you guys don't get it
 
標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか
 
An Introduction to Windows PowerShell
An Introduction to Windows PowerShellAn Introduction to Windows PowerShell
An Introduction to Windows PowerShell
 
XSS and CSRF with HTML5
XSS and CSRF with HTML5XSS and CSRF with HTML5
XSS and CSRF with HTML5
 
Introduction to PowerShell
Introduction to PowerShellIntroduction to PowerShell
Introduction to PowerShell
 
ProxySQL High Avalability and Configuration Management Overview
ProxySQL High Avalability and Configuration Management OverviewProxySQL High Avalability and Configuration Management Overview
ProxySQL High Avalability and Configuration Management Overview
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
 
MongoDBの脆弱性診断 - smarttechgeeks
MongoDBの脆弱性診断 - smarttechgeeksMongoDBの脆弱性診断 - smarttechgeeks
MongoDBの脆弱性診断 - smarttechgeeks
 
OWASP WordPressセキュリティ実装ガイドライン (セキュアなWordPressの構築)
OWASP WordPressセキュリティ実装ガイドライン (セキュアなWordPressの構築)OWASP WordPressセキュリティ実装ガイドライン (セキュアなWordPressの構築)
OWASP WordPressセキュリティ実装ガイドライン (セキュアなWordPressの構築)
 
C2 Matrix A Comparison of Command and Control Frameworks
C2 Matrix A Comparison of Command and Control FrameworksC2 Matrix A Comparison of Command and Control Frameworks
C2 Matrix A Comparison of Command and Control Frameworks
 
PGDay.Amsterdam 2018 - Stefan Fercot - Save your data with pgBackRest
PGDay.Amsterdam 2018 - Stefan Fercot - Save your data with pgBackRestPGDay.Amsterdam 2018 - Stefan Fercot - Save your data with pgBackRest
PGDay.Amsterdam 2018 - Stefan Fercot - Save your data with pgBackRest
 
Apache Cassandra Lesson: Data Modelling and CQL3
Apache Cassandra Lesson: Data Modelling and CQL3Apache Cassandra Lesson: Data Modelling and CQL3
Apache Cassandra Lesson: Data Modelling and CQL3
 
Red Team Methodology - A Naked Look
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked Look
 
OWASP AppSecCali 2015 - Marshalling Pickles
OWASP AppSecCali 2015 - Marshalling PicklesOWASP AppSecCali 2015 - Marshalling Pickles
OWASP AppSecCali 2015 - Marshalling Pickles
 
[pgday.Seoul 2022] POSTGRES 테스트코드로 기여하기 - 이동욱
[pgday.Seoul 2022] POSTGRES 테스트코드로 기여하기 - 이동욱[pgday.Seoul 2022] POSTGRES 테스트코드로 기여하기 - 이동욱
[pgday.Seoul 2022] POSTGRES 테스트코드로 기여하기 - 이동욱
 
Pgday bdr 천정대
Pgday bdr 천정대Pgday bdr 천정대
Pgday bdr 천정대
 

Similar to PSU Security Conference 2015 - LAPS Presentation

0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
Timothy Chen
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
Practical management of development & QA environments for SharePoint 2013
Practical management of development & QA environments for SharePoint 2013Practical management of development & QA environments for SharePoint 2013
Practical management of development & QA environments for SharePoint 2013
SharePointRadi
 

Similar to PSU Security Conference 2015 - LAPS Presentation (20)

rsa-usa-2019-keynote-paula-januszkiewicz
rsa-usa-2019-keynote-paula-januszkiewiczrsa-usa-2019-keynote-paula-januszkiewicz
rsa-usa-2019-keynote-paula-januszkiewicz
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Course003 plugins chapters
Course003 plugins chaptersCourse003 plugins chapters
Course003 plugins chapters
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
 
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_onlineAsecurity-guidelines_and_best_practices_for_retail_online_and_business_online
Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 
Dakotacon 2017
Dakotacon 2017Dakotacon 2017
Dakotacon 2017
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Practical management of development & QA environments for SharePoint 2013
Practical management of development & QA environments for SharePoint 2013Practical management of development & QA environments for SharePoint 2013
Practical management of development & QA environments for SharePoint 2013
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Up is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and RightUp is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and Right
 
Enterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security AssessmentsEnterprise PowerShell for Remote Security Assessments
Enterprise PowerShell for Remote Security Assessments
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
Single Sign On Across Drupal 8 - DrupalCon Global 2020
Single Sign On Across Drupal 8 - DrupalCon Global 2020Single Sign On Across Drupal 8 - DrupalCon Global 2020
Single Sign On Across Drupal 8 - DrupalCon Global 2020
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
What is RUDDER and when should I use it?
What is RUDDER and when should I use it?What is RUDDER and when should I use it?
What is RUDDER and when should I use it?
 

More from Dan Barr (8)

Automate Building your VM Templates with Packer - CPAVMUG 2021-12-02
Automate Building your VM Templates with Packer - CPAVMUG 2021-12-02Automate Building your VM Templates with Packer - CPAVMUG 2021-12-02
Automate Building your VM Templates with Packer - CPAVMUG 2021-12-02
 
vBrownBag 2015-07-08 - VCP6-DCV Foundations Section 7: Monitoring
vBrownBag 2015-07-08 - VCP6-DCV Foundations Section 7: MonitoringvBrownBag 2015-07-08 - VCP6-DCV Foundations Section 7: Monitoring
vBrownBag 2015-07-08 - VCP6-DCV Foundations Section 7: Monitoring
 
VMworld 2016 vBrownBag Tech Talk - VM Capacity Management
VMworld 2016 vBrownBag Tech Talk - VM Capacity ManagementVMworld 2016 vBrownBag Tech Talk - VM Capacity Management
VMworld 2016 vBrownBag Tech Talk - VM Capacity Management
 
VMworld 2012 vBrownBag Tech Talk - Functional SRM Testing
VMworld 2012 vBrownBag Tech Talk - Functional SRM TestingVMworld 2012 vBrownBag Tech Talk - Functional SRM Testing
VMworld 2012 vBrownBag Tech Talk - Functional SRM Testing
 
PSU VMUG 2016-09-22 VMworld Experience
PSU VMUG 2016-09-22 VMworld ExperiencePSU VMUG 2016-09-22 VMworld Experience
PSU VMUG 2016-09-22 VMworld Experience
 
CPAVMUG Presentation 2016-04-06 - Management Cluster
CPAVMUG Presentation 2016-04-06 - Management ClusterCPAVMUG Presentation 2016-04-06 - Management Cluster
CPAVMUG Presentation 2016-04-06 - Management Cluster
 
CPAVMUG Presentation - Community Resources
CPAVMUG Presentation - Community ResourcesCPAVMUG Presentation - Community Resources
CPAVMUG Presentation - Community Resources
 
CPAVMUG Presentation 2015-07-16 - Resource Pool Balancing
CPAVMUG Presentation 2015-07-16 - Resource Pool BalancingCPAVMUG Presentation 2015-07-16 - Resource Pool Balancing
CPAVMUG Presentation 2015-07-16 - Resource Pool Balancing
 

PSU Security Conference 2015 - LAPS Presentation

  • 1. Managing Local Administrator Passwords with LAPS 2015 PENN STATE SECURITY CONFERENCE DAN BARR – DRB45@PSU.EDU SYSTEMS ADMINISTRATOR, APPLIED RESEARCH LABORATORY 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 2. The Shared Password Threat Shared passwords are one vector used in Pass-the-Hash attacks It only takes one compromised client to effectively compromise every system using the same local Administrator password Makes lateral movement within a “trusted” network trivial Even if the clear text password isn’t compromised, you’re still in big trouble So, how do we manage passwords on a large # of systems? ◦ And rotate them often? ◦ And control who can access them? ◦ Without spending a small fortune on additional complex infrastructure or products? 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 3. What is Pass-the-Hash (PtH)? (The short, short version) Credential replay attack Attacker does not need the cleartext password! Hashes can be harvested from: ◦ Memory (lsass.exe process) ◦ Local SAM database (local accounts and cached AD credentials) ◦ NTLM traffic sniffing (but requires brute-force since hash is encrypted over the wire) NTLM and Kerberos (via ticket replay/forwarding) are both vulnerable Compromised Client Admin Client Clients Servers Databases Attacker 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 4. More on PtH For more in-depth information and a demo of Pass-the-Hash: Security Features of OneForest Active Directory Deployment Keith Brautigam & Jake DeSantis Thursday at 2:50pm 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 5. What is LAPS? •Local Administrator Password Solution •Free tool made public by Microsoft in May 2015 •Formerly only available to MS Premier Support agreement holders •Securely manages unique, random local Administrator passwords on managed systems •Completely implemented using AD & Group Policy, no additional infrastructure needed •Developed due to frequency of shared admin passwords used as a primary attack vector in customer security incidents handled by Microsoft •Does NOT eliminate PtH, just reduces the impact 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 6. How does it work? •Schema extension adds two attributes to Computer objects: • ms-Mcs-AdmPwd: Confidential, RODC Filtered • ms-Mcs-AdmPwdExpirationTime •Client-side GPO extension (DLL) installed via MSI •Managed via simple GUI, PowerShell, or native AD management tools Active Directory Group Policy Framework AdmPwd.dll LAPS UI PowerShell Group Policy Editor AD Computer Account ms-Mcs-AdmPwd ms-Mcs-AdmPwdExpirationTime 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 7. LAPS Features & Requirements FEATURES •Passwords stored centrally in AD •Optional audit/debug logging to client’s Security Event Log •Define password parameters: length, complexity, age •Force a password reset •GUI, PowerShell, or native AD tools for management REQUIREMENTS AD: At least Server 2003 SP1 Officially-supported clients: ◦ Vista with current SP & above ◦ Server 2003 SP2 & above Unofficially works on XP 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 8. LAPS Process GP Refresh Check expiration timestamp in AD attribute If expired, generate new password based on configured rules Store new password in AD attribute and update expiration timestamp If successful, update local account PW 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 9. LAPS Security Considerations Kerberos encryption used in transit Use AD object access auditing to track password retrievals Currently only handles one account per client ◦ Does not have to be built-in Administrator Password is stored in clear text ◦ Encryption at rest would require key exchange (symmetric) or PKI (assymetric) ◦ ACLs adequately protect ◦ Maintains the solution’s simplicity ◦ Compromised AD means game over anyway AD attribute is marked confidential, need one of the following permissions to read it: ◦ “Full Control” on computer object, OR ◦ “All Extended Rights” on computer object, OR ◦ “Control Access” on ms-Mcs-AdmPwd attribute Not replicated to RODCs Not exposed in audit logging 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 10. Group Policy Settings 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 11. LAPS UI 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 12. PowerShell Module “AdmPwd.PS” Cmdlets: ◦ Find-AdmPwdExtendedRights ◦ Get-AdmPwdPassword ◦ Reset-AdmPwdPassword ◦ Set-AdmPwdAuditing ◦ Set-AdmPwdComputerSelfPermission ◦ Set-AdmPwdReadPasswordPermission ◦ Set-AdmPwdResetPasswordPermission ◦ Update-AdmPwdADSchema 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 13. Typical Deployment Workflow Extend AD Schema Review/Revoke Extended Rights Add Machine Rights (SELF) Add User Rights and Auditing Apply Group Policy Settings Deploy Client Side Extension 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 14. Deployment Workflow - PowerShell Extend AD Schema ◦ Update-AdmPwdADSchema Audit/remove undesired extended rights ◦ Find-AdmPwdExtendedRights -Identity <OU Name> | Format-Table Add Machine rights (SELF permission to update new attributes) ◦ Set-AdmPwdComputerSelfPermission -OrgUnit <OU Name> Add User rights to read PW or force reset ◦ Set-AdmPwdReadPasswordPermission -OrgUnit <OU Name> -AllowedPrincipals <users/groups> ◦ Set-AdmPwdResetPasswordPermission -OrgUnit <OU Name> -AllowedPrincipals <users/groups> Enable access auditing ◦ Set-AdmPwdAuditing -OrgUnit <OU Name> -AuditedPrincipals <users/groups/Everyone> 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 15. Other PtH Mitigations Upgrade clients – lots of kernel-level hardening in newer (Win8+) versions. Limit client-to-client communications Disable caching of AD credentials where possible Limit use/scope of privileged accounts – least user access ◦ Use hardened administrative stations & “jump” servers ◦ Offers fewer chances to harvest a privileged hash Limit debug privileges (often used to access memory of protected processes) 10/14/2015 PENN STATE SECURITY CONFERENCE
  • 16. THANK YOU! Dan Barr – drb45@psu.edu Reminder: Security of OneForest AD Deployment, 2:30pm tomorrow Keith Brautigam & Jake DeSantis, ITS Identity Services 10/14/2015 PENN STATE SECURITY CONFERENCE