SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Escalation
Defenses
A D G u a r d R a i l s E v e r y
C o m p a n y S h o u l d D e p l o y.
© 2 0 2 0 : : D a v i d Ro w e : : S e c f ra m e . c o m
David Rowe, CISSP
Cloud Security at Boston Children's Hospital.
IR advisor for multiple incident response teams
responding to Advanced Persistent Threat (Nation
State) attacks.
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
David Rowe, CISSP
Secframe.com
/in/davidprowe
@davidprowe
david@secframe.com
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Today:
 What is Active Directory?
 Why is Access Important?
 Do you swear to talk about Active Directory, the
whole Active Directory and nothing but Active
Directory?
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
What is Active
Directory?
1
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Object Information Store
A.D. stores information about OBJECTS
on a computer network
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Object Information Store
Hierarchy: Parent/Child
Common Object Types:
Users
Computers
Groups
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Security Defined Through:
Via ACLs; Ownership, & Membership
Objects authorized to perform actions
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Ex A.D. Hierarchy:
So urce:
https://www.secframe.com/blog/account-operators-what-can-they-control
Ex: Account Operators
Top down access to
all these objects
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
AD
Administrative
Model
2
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Microsoft’s Solution ESAE
Enhanced
Security
Administrative
Environment
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
ESAE Purpose
Protect identity systems using a set of
buffer zones between full control of
the Environment (Tier 0) and the high
risk workstation assets that attackers
frequently compromise.
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
https://docs.microsoft.com/en-us/windows-
server/identity/securing-privileged-access/securing-privileged-
access-reference-material
Microsoft’s Solution ESAE
ESAE’s first presentation:
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
ESAE: 3 Stages, 14 Steps
Stage 1:
Separate Admin accounts for
Wo rks ta tio ns
Sepa ra te Admin a cco unts fo r Servers
Sepa ra te Admin a cco unts fo r Do ma in
Co ntro llers
Stage 2:
Privileged Acces s Wo rks ta tio ns fo r
Admins
U nique Lo ca l Pa s s wo rds fo r
Servers & Wo rks ta tio ns
T ime B o und Privileges
J us t E no ugh Adminis tra tio n
Lower Attack Surfaces
o f DCs : Limit Admins
Atta ck Detectio n
Stage 3
Mo dernize ro les a nd delega tio n
mo del to be co mplia nt with the tiers
Sma rtca rd a uthentica tio n fo r a ll
a dmins
Admin Fo res t fo r AD a dmins
W indo ws Defender Device Gua rd
Shielded V Ms
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Today’s Topic
Stage 1:
Separate Admin accounts for
Wo rks ta tio ns
Sepa ra te Admin a cco unts fo r Servers
Sepa ra te Admin a cco unts fo r Do ma in
Co ntro llers
Stage 2:
Privileged Acces s Wo rks ta tio ns fo r
Admins
U nique Lo ca l Pa s s wo rds fo r
Servers & Wo rks ta tio ns
T ime B o und Privileges
J us t E no ugh Adminis tra tio n
Lower Attack Surfaces
o f DCs : Limit Admins
Atta ck Detectio n
Stage 3
Mo dernize ro les a nd delega tio n
mo del to be co mplia nt with the tiers
Sma rtca rd a uthentica tio n fo r a ll
a dmins
Admin Fo res t fo r AD a dmins
W indo ws Defender Device Gua rd
Shielded V Ms
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Active Directory Tier Model
The highest level of privilege. Accounts which have administrative control
over the entire environment through the ability to manage identity and
permissions enterprise-wide.
Objects: Domain Controllers; Systems that manage DCs; Accounts with access to these systems
Tier 0
Domain &
Enterprise
Admins
Tier 1
Server
Admins
Accounts which have administrative control over enterprise resources
that serve many users or manage business-critical data and
applications. Cannot control Tier 0 resources.
Objects: Servers and Srv admins; Enterprise apps & admins; Cloud service administrators
Tier 2
Workstation
Admins
Accounts with administrative privileges over only standard user
accounts and single-user devices. Cannot control Tier 1 or Tier 0
resources.
Objects: Helpdesk support; Device support; User support
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Attacker’s
Access Path
3
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
What is an Access Path?
An access path, also called a compromise
path, is an indirect path to compromising
critical resources on a domain.
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
How can the Tiers help?
By limiting the use of administrators’
credentials, the exposure factor of the
credentials is decreased.
ELI5: If admins don’t log in everywhere,
passwords are harder to locate and crack
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Access Path Example 1
Attacker compromises desktop computer
Breaks MS Word
Steals Field Tech account when they log in
Finds server where stolen creds work
Dumps cached server admin creds
Jumps to other available servers dumping
creds
Finds server with DA creds
Dumps and decrypts AD Password Database
NTDS.DIT
Traverses and attack other trusted domains
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Access Path Example 2
Attacker compromises office printer
Printer interfaces with AD using LDAP
Attacker steals printer’s AD service account
Attacker uses creds to traverse desktops &
servers
Finds SCCM/Landesk/Ansible admin desktop
computer
Uses tool to add local admin privileges to
Jump Server
Harvests DA creds off Jump Server
Dump and decrypt AD Password Database
NTDS.DIT
Traverse and attack other trusted domains
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Access Path Example 3
Attacker compromises desktop computer
Requests Kerberos Tickets to any account
with an SPN - Kerberoasting
Cracks cached creds into plaintext
Jumps to other available servers dumping
other cached credentials
Harvests DA creds off Server
Dump and decrypt AD Password Database
NTDS.DIT
Traverse and attack other trusted domains
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• The attacker dumped the cached credentials on the server
• Finds a local administrator password identical across
machines
• Attacker moved laterally across the domain probing servers
until he/she finds a computer where a domain administrator
(DA) credential was stored
• Attacker dumps DA hash from machine and cracks it
• The attacker now has full administrative access on the
domain
The Breach & Prevention
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• The attacker dumped the cached credentials on the server
• Finds a local administrator password identical across
machines
• Attacker moved laterally across the domain probing servers
until he/she finds a computer where a domain administrator
(DA) credential was stored
• Attacker dumps DA hash from machine and cracks it
• The attacker now has full administrative access on the
domain
The Breach & PreventionThis will eventually happen
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• The attacker dumped the cached credentials on the server
• Finds a local administrator password identical across
machines
• Attacker moved laterally across the domain probing servers
until he/she finds a computer where a domain administrator
(DA) credential was stored
• Attacker dumps DA hash from machine and cracks it
• The attacker now has full administrative access on the
domain
The Breach & PreventionThis will eventually happen
Patch
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• Finds a local administrator password identical across
machines
• Attacker moved laterally across the domain probing servers
until he/she finds a computer where a domain administrator
(DA) credential was stored
• Attacker dumps DA hash from machine and cracks it
• The attacker now has full administrative access on the
domain
The Breach & PreventionThis will eventually happen
Patch
Cached
cred GPO
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• Attacker moved laterally across the domain probing servers
until he/she finds a computer where a domain administrator
(DA) credential was stored
• Attacker dumps DA hash from machine and cracks it
• The attacker now has full administrative access on the
domain
The Breach & PreventionThis will eventually happen
Patch
Cached
cred GPO
LAPS or PWD Script
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• Attacker dumps DA hash from machine and cracks it
• The attacker now has full administrative access on the
domain
The Breach & PreventionThis will eventually happen
Patch
Cached
cred GPO
LAPS or PWD Script
Block DA
login GPO
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• The attacker now has full administrative access on the
domain
The Breach & PreventionThis will eventually happen
Patch
Cached
cred GPO
LAPS or PWD Script
Block DA
login GPO
Cached
cred GPO
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
• An unpatched public facing web server was compromised
• An attacker exploited a vulnerability, granting admin access
to the server
• The attacker now has full administrative access on the
domain
The Breach & Prevention
© 2 0 1 9 : : D a v i d R o w e : : S e c f r a m e . c o m
This will eventually happen
Patch
Cached
cred GPO
LAPS or PWD Script
Block DA
login GPO
Cached
cred GPO
Bad Actor Has No Direct
Path to DA
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
GPOS needed
4
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Block logins across tiers
 Start by blocking Domain Admins (DAs)
logins
 They should not be able to log into
workstations or servers
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Block logins across tiers
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Cached Creds GPO
Create GPOs to remove the cached credentials from
computers
…then reboot
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Cached Credentials?
 Computer level setting
 Interactive logon: Number of previous
logons to cache [store in memory] (in
case domain controller is not
available)
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Cached Credentials Defaults
 Value indicates stored users
credentials on device –
 Windows Operating Systems default to
10
 Default stored as RC4 hash on system
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Vulnerabilities
 Targeted Pass-the-hash -If you can’t
crack it, encapsulate and pass it
 RC4 Nomore – one type of RC4 Exploit
– 52 Hrs to crack
 One incident I observed evidence a
plaintext password 9 minutes after the
hash was compromised
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Playground: Exploit Tools
Mimikatz, Impacket, JtR, Hashcat,
Ophcrack, Taskmanager… + lsass.exe,
Pwdumpx + passwordPro
Google for more!
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Cached Creds: GPO Servers
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Cached Creds: GPO Workstations
© 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
Now what do I do?
D e p l o y t h e G P O s t o r e m o v e v u l n e ra b i l i t i e s
G u i d a n c e o n F ra m e w o r k s a n d To o l s
S e c u r i t y A u d i t s & Ro a d m a p s
Secframe.com/about
Slides available for
download at:
Secframe.com/presentations

Weitere ähnliche Inhalte

Was ist angesagt?

Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...BeyondTrust
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?Tomasz Jakubowski
 
2016 state of the internet threat advisory dnssec ddos amplification attacks
2016 state of the internet threat advisory dnssec ddos amplification attacks2016 state of the internet threat advisory dnssec ddos amplification attacks
2016 state of the internet threat advisory dnssec ddos amplification attacksAndrey Apuhtin
 
hacking and crecjing
hacking and crecjinghacking and crecjing
hacking and crecjingparth jasani
 
System hacking
System hackingSystem hacking
System hackingCAS
 
07182013 Hacking Appliances: Ironic exploits in security products
07182013 Hacking Appliances: Ironic exploits in security products07182013 Hacking Appliances: Ironic exploits in security products
07182013 Hacking Appliances: Ironic exploits in security productsNCC Group
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application SecurityChong-Kuan Chen
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseBeyondTrust
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentTeymur Kheirkhabarov
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1Chong-Kuan Chen
 
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Xavier Ashe
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerLippo Group Digital
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detectionChong-Kuan Chen
 
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy codeG Prachi
 

Was ist angesagt? (20)

DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
Addios!
Addios!Addios!
Addios!
 
How to measure your security response readiness?
How to measure your security response readiness?How to measure your security response readiness?
How to measure your security response readiness?
 
2016 state of the internet threat advisory dnssec ddos amplification attacks
2016 state of the internet threat advisory dnssec ddos amplification attacks2016 state of the internet threat advisory dnssec ddos amplification attacks
2016 state of the internet threat advisory dnssec ddos amplification attacks
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
hacking and crecjing
hacking and crecjinghacking and crecjing
hacking and crecjing
 
System hacking
System hackingSystem hacking
System hacking
 
07182013 Hacking Appliances: Ironic exploits in security products
07182013 Hacking Appliances: Ironic exploits in security products07182013 Hacking Appliances: Ironic exploits in security products
07182013 Hacking Appliances: Ironic exploits in security products
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your Enterprise
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 
Hunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
 
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
Power of logs: practices for network security
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network security
 
NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 

Ähnlich wie Escalation defenses ad guardrails every company should deploy

Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack SurfaceAlert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the CloudCloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the CloudMarkAnnati
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Secure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollarSecure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollarDavid Rowe
 
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryWill Schroeder
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】Hacks in Taiwan (HITCON)
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryWill Schroeder
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Intro to Wordpress Security
Intro to Wordpress SecurityIntro to Wordpress Security
Intro to Wordpress SecurityChris Dodds
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
Exploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator InsecuritiesExploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator InsecuritiesPriyanka Aash
 
Derbycon - Passing the Torch
Derbycon - Passing the TorchDerbycon - Passing the Torch
Derbycon - Passing the TorchWill Schroeder
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraftenigma0x3
 
Simple Ways to Secure and Maintain Your WordPress Website
Simple Ways to Secure and Maintain Your WordPress WebsiteSimple Ways to Secure and Maintain Your WordPress Website
Simple Ways to Secure and Maintain Your WordPress WebsiteRich Plakas
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Quest
 
BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopAjay Choudhary
 
MS Cloud day - Understanding and implementation on Windows Azure platform sec...
MS Cloud day - Understanding and implementation on Windows Azure platform sec...MS Cloud day - Understanding and implementation on Windows Azure platform sec...
MS Cloud day - Understanding and implementation on Windows Azure platform sec...Spiffy
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 

Ähnlich wie Escalation defenses ad guardrails every company should deploy (20)

Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack Surface
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the CloudCloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Secure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollarSecure active directory in one day without spending a single dollar
Secure active directory in one day without spending a single dollar
 
The Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
 
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】【HITCON FreeTalk 2021 -  SolarWinds 供應鏈攻擊事件分析】
【HITCON FreeTalk 2021 - SolarWinds 供應鏈攻擊事件分析】
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
 
Bridging the Gap
Bridging the GapBridging the Gap
Bridging the Gap
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Intro to Wordpress Security
Intro to Wordpress SecurityIntro to Wordpress Security
Intro to Wordpress Security
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Exploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator InsecuritiesExploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator Insecurities
 
Derbycon - Passing the Torch
Derbycon - Passing the TorchDerbycon - Passing the Torch
Derbycon - Passing the Torch
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
 
Simple Ways to Secure and Maintain Your WordPress Website
Simple Ways to Secure and Maintain Your WordPress WebsiteSimple Ways to Secure and Maintain Your WordPress Website
Simple Ways to Secure and Maintain Your WordPress Website
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
BSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
 
MS Cloud day - Understanding and implementation on Windows Azure platform sec...
MS Cloud day - Understanding and implementation on Windows Azure platform sec...MS Cloud day - Understanding and implementation on Windows Azure platform sec...
MS Cloud day - Understanding and implementation on Windows Azure platform sec...
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Escalation defenses ad guardrails every company should deploy

  • 1. Escalation Defenses A D G u a r d R a i l s E v e r y C o m p a n y S h o u l d D e p l o y. © 2 0 2 0 : : D a v i d Ro w e : : S e c f ra m e . c o m
  • 2. David Rowe, CISSP Cloud Security at Boston Children's Hospital. IR advisor for multiple incident response teams responding to Advanced Persistent Threat (Nation State) attacks. © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 3. David Rowe, CISSP Secframe.com /in/davidprowe @davidprowe david@secframe.com © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 4. Today:  What is Active Directory?  Why is Access Important?  Do you swear to talk about Active Directory, the whole Active Directory and nothing but Active Directory? © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 5. What is Active Directory? 1 © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 6. Object Information Store A.D. stores information about OBJECTS on a computer network © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 7. Object Information Store Hierarchy: Parent/Child Common Object Types: Users Computers Groups © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 8. Security Defined Through: Via ACLs; Ownership, & Membership Objects authorized to perform actions © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 9. Ex A.D. Hierarchy: So urce: https://www.secframe.com/blog/account-operators-what-can-they-control Ex: Account Operators Top down access to all these objects © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 10. AD Administrative Model 2 © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 11. Microsoft’s Solution ESAE Enhanced Security Administrative Environment © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 12. ESAE Purpose Protect identity systems using a set of buffer zones between full control of the Environment (Tier 0) and the high risk workstation assets that attackers frequently compromise. © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m https://docs.microsoft.com/en-us/windows- server/identity/securing-privileged-access/securing-privileged- access-reference-material
  • 13. Microsoft’s Solution ESAE ESAE’s first presentation: © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 14. ESAE: 3 Stages, 14 Steps Stage 1: Separate Admin accounts for Wo rks ta tio ns Sepa ra te Admin a cco unts fo r Servers Sepa ra te Admin a cco unts fo r Do ma in Co ntro llers Stage 2: Privileged Acces s Wo rks ta tio ns fo r Admins U nique Lo ca l Pa s s wo rds fo r Servers & Wo rks ta tio ns T ime B o und Privileges J us t E no ugh Adminis tra tio n Lower Attack Surfaces o f DCs : Limit Admins Atta ck Detectio n Stage 3 Mo dernize ro les a nd delega tio n mo del to be co mplia nt with the tiers Sma rtca rd a uthentica tio n fo r a ll a dmins Admin Fo res t fo r AD a dmins W indo ws Defender Device Gua rd Shielded V Ms © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 15. Today’s Topic Stage 1: Separate Admin accounts for Wo rks ta tio ns Sepa ra te Admin a cco unts fo r Servers Sepa ra te Admin a cco unts fo r Do ma in Co ntro llers Stage 2: Privileged Acces s Wo rks ta tio ns fo r Admins U nique Lo ca l Pa s s wo rds fo r Servers & Wo rks ta tio ns T ime B o und Privileges J us t E no ugh Adminis tra tio n Lower Attack Surfaces o f DCs : Limit Admins Atta ck Detectio n Stage 3 Mo dernize ro les a nd delega tio n mo del to be co mplia nt with the tiers Sma rtca rd a uthentica tio n fo r a ll a dmins Admin Fo res t fo r AD a dmins W indo ws Defender Device Gua rd Shielded V Ms © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 16. Active Directory Tier Model The highest level of privilege. Accounts which have administrative control over the entire environment through the ability to manage identity and permissions enterprise-wide. Objects: Domain Controllers; Systems that manage DCs; Accounts with access to these systems Tier 0 Domain & Enterprise Admins Tier 1 Server Admins Accounts which have administrative control over enterprise resources that serve many users or manage business-critical data and applications. Cannot control Tier 0 resources. Objects: Servers and Srv admins; Enterprise apps & admins; Cloud service administrators Tier 2 Workstation Admins Accounts with administrative privileges over only standard user accounts and single-user devices. Cannot control Tier 1 or Tier 0 resources. Objects: Helpdesk support; Device support; User support © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 17. Attacker’s Access Path 3 © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 18. What is an Access Path? An access path, also called a compromise path, is an indirect path to compromising critical resources on a domain. © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 19. How can the Tiers help? By limiting the use of administrators’ credentials, the exposure factor of the credentials is decreased. ELI5: If admins don’t log in everywhere, passwords are harder to locate and crack © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 20. Access Path Example 1 Attacker compromises desktop computer Breaks MS Word Steals Field Tech account when they log in Finds server where stolen creds work Dumps cached server admin creds Jumps to other available servers dumping creds Finds server with DA creds Dumps and decrypts AD Password Database NTDS.DIT Traverses and attack other trusted domains © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 21. Access Path Example 2 Attacker compromises office printer Printer interfaces with AD using LDAP Attacker steals printer’s AD service account Attacker uses creds to traverse desktops & servers Finds SCCM/Landesk/Ansible admin desktop computer Uses tool to add local admin privileges to Jump Server Harvests DA creds off Jump Server Dump and decrypt AD Password Database NTDS.DIT Traverse and attack other trusted domains © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 22. Access Path Example 3 Attacker compromises desktop computer Requests Kerberos Tickets to any account with an SPN - Kerberoasting Cracks cached creds into plaintext Jumps to other available servers dumping other cached credentials Harvests DA creds off Server Dump and decrypt AD Password Database NTDS.DIT Traverse and attack other trusted domains © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 23. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • The attacker dumped the cached credentials on the server • Finds a local administrator password identical across machines • Attacker moved laterally across the domain probing servers until he/she finds a computer where a domain administrator (DA) credential was stored • Attacker dumps DA hash from machine and cracks it • The attacker now has full administrative access on the domain The Breach & Prevention © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 24. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • The attacker dumped the cached credentials on the server • Finds a local administrator password identical across machines • Attacker moved laterally across the domain probing servers until he/she finds a computer where a domain administrator (DA) credential was stored • Attacker dumps DA hash from machine and cracks it • The attacker now has full administrative access on the domain The Breach & PreventionThis will eventually happen © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 25. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • The attacker dumped the cached credentials on the server • Finds a local administrator password identical across machines • Attacker moved laterally across the domain probing servers until he/she finds a computer where a domain administrator (DA) credential was stored • Attacker dumps DA hash from machine and cracks it • The attacker now has full administrative access on the domain The Breach & PreventionThis will eventually happen Patch © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 26. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • Finds a local administrator password identical across machines • Attacker moved laterally across the domain probing servers until he/she finds a computer where a domain administrator (DA) credential was stored • Attacker dumps DA hash from machine and cracks it • The attacker now has full administrative access on the domain The Breach & PreventionThis will eventually happen Patch Cached cred GPO © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 27. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • Attacker moved laterally across the domain probing servers until he/she finds a computer where a domain administrator (DA) credential was stored • Attacker dumps DA hash from machine and cracks it • The attacker now has full administrative access on the domain The Breach & PreventionThis will eventually happen Patch Cached cred GPO LAPS or PWD Script © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 28. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • Attacker dumps DA hash from machine and cracks it • The attacker now has full administrative access on the domain The Breach & PreventionThis will eventually happen Patch Cached cred GPO LAPS or PWD Script Block DA login GPO © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 29. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • The attacker now has full administrative access on the domain The Breach & PreventionThis will eventually happen Patch Cached cred GPO LAPS or PWD Script Block DA login GPO Cached cred GPO © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 30. • An unpatched public facing web server was compromised • An attacker exploited a vulnerability, granting admin access to the server • The attacker now has full administrative access on the domain The Breach & Prevention © 2 0 1 9 : : D a v i d R o w e : : S e c f r a m e . c o m This will eventually happen Patch Cached cred GPO LAPS or PWD Script Block DA login GPO Cached cred GPO Bad Actor Has No Direct Path to DA © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 31. GPOS needed 4 © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 32. Block logins across tiers  Start by blocking Domain Admins (DAs) logins  They should not be able to log into workstations or servers © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 33. Block logins across tiers © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 34. Cached Creds GPO Create GPOs to remove the cached credentials from computers …then reboot © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 35. Cached Credentials?  Computer level setting  Interactive logon: Number of previous logons to cache [store in memory] (in case domain controller is not available) © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 36. Cached Credentials Defaults  Value indicates stored users credentials on device –  Windows Operating Systems default to 10  Default stored as RC4 hash on system © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 37. Vulnerabilities  Targeted Pass-the-hash -If you can’t crack it, encapsulate and pass it  RC4 Nomore – one type of RC4 Exploit – 52 Hrs to crack  One incident I observed evidence a plaintext password 9 minutes after the hash was compromised © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 38. Playground: Exploit Tools Mimikatz, Impacket, JtR, Hashcat, Ophcrack, Taskmanager… + lsass.exe, Pwdumpx + passwordPro Google for more! © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 39. Cached Creds: GPO Servers © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 40. Cached Creds: GPO Workstations © 2 0 2 0 : : D a v i d R o w e : : S e c f r a m e . c o m
  • 41. Now what do I do? D e p l o y t h e G P O s t o r e m o v e v u l n e ra b i l i t i e s G u i d a n c e o n F ra m e w o r k s a n d To o l s S e c u r i t y A u d i t s & Ro a d m a p s Secframe.com/about
  • 42. Slides available for download at: Secframe.com/presentations

Hinweis der Redaktion

  1. Add three and label with correct stuff
  2. Add three and label with correct stuff
  3. Add three and label with correct stuff
  4. Add three and label with correct stuff
  5. Add three and label with correct stuff
  6. Add three and label with correct stuff
  7. Add three and label with correct stuff
  8. Add three and label with correct stuff