Computers Gone Rogue. Abusing Computer Accounts to Gain Control in an Active Directory Environment. Marina Simakov & Itai Grady

Similar documents
10 Active Directory Misconfigurations That Lead to Total Compromise Austin, TX 201 W 5th St.

Active Directory Attacks and Detection

Deploy and Configure Microsoft LAPS. Step by step guide and useful tips

Premediation. The Art of Proactive Remediation. Matthew McWhirt, Senior Manager Manfred Erjak, Principal Consultant OCTOBER 1 4, 2018 WASHINGTON, D.C.

Pass-the-Hash Attacks

From Public Key to Exploitation: Exploiting the Authentication in MS-RDP [CVE ]

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Active Directory Attacks and Detection Part -II

KERBEROS PARTY TRICKS

ALL ROADS LEAD TO DOMAIN ADMIN BREACH TO CDE A SECTOR CONFERENCE PRESENTATION OCTOBER 2016

COPYRIGHTED MATERIAL. Contents. Part I: The Basics in Depth 1. Chapter 1: Windows Attacks 3. Chapter 2: Conventional and Unconventional Defenses 51

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

7 EASY ATTACKS AGAINST ACTIVE DIRECTORY

Active Directory Attacks and Detection

Active Directory Security: The Journey. Sean Metcalf s e a n TrimarcSecurity.com TrimarcSecurity.

Detecting Lateral Movement in APTs ~Analysis Approach on Windows Event Logs~ June 17, 2016 Shingo ABE ICS security Response Group JPCERT/CC

Securing Active Directory Administration

Active Directory Attacks and Detection Part -III

Pentesting Windows Domains

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.

Active Directory Security: The Journey. Sean Metcalf s e a n TrimarcSecurity.com TrimarcSecurity.

Pass-the-Hash Attacks. Michael Grafnetter

CyberArk Privileged Threat Analytics

The Kerberos Authentication Service

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810

How to Integrate an External Authentication Server

Radius, LDAP, Radius used in Authenticating Users

Active directory : How to change a weak point into a leverage for security monitoring Vincent LE TOUX ENGIE France OSSIR 2017 Paris (France) April,

Post-Exploitation with WCE v1.2

ACTIVE DIRECTORY DOMAIN STIG REVISION HISTORY. Version 2, Release January Developed by DISA for the DoD

Hacking in the Attack Kill Chain

IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP

From Workstation to Domain. Sean Metcalf s e a n TrimarcSecurity.com TrimarcSecurity.com

Attacking and Defending Active Directory July, 2017

Server Tailgating A Chosen- Plaintext Attack on RDP. - Eyal Karni - Yaron Zinar - Roman Blachman

Key distribution and certification

13/10/2013. Kerberos. Key distribution and certification. The Kerberos protocol was developed at MIT in the 1980.

Ing. Ondrej Sevecek Windows Server Product Manager GOPAS a.s.

CNIT 129S: Securing Web Applications. Ch 8: Attacking Access Controls

IT Exam Training online / Bootcamp

the SWIFT Customer Security

Kerberos and Active Directory symmetric cryptography in practice COSC412

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

C1: Define Security Requirements

PrecisionAccess Trusted Access Control

Man-In-The-Browser Attacks. Daniel Tomescu

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Endpoint Security - what-if analysis 1

Hunting Lateral Movement with Windows Events Logs. SANS Threat Hunting Summit 2018 Mauricio

Data Source Kerberos / oauth On the Wire Explaining Kerberos Constrained Delegation with Protocol Transition and Oauth for Data Source Single Sign On

Event Log 101. What is Event Log? Windows version of syslog.

Zimperium Global Threat Data

Persistent key, value storage

Configure advanced audit policies

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Securing Active Directory Administration. Sean Metcalf s e a n TrimarcSecurity.com TrimarcSecurity.

News and Updates June 1, 2017

Securing ArcGIS Services

Attackers Process. Compromise the Root of the Domain Network: Active Directory

KEY DISTRIBUTION AND USER AUTHENTICATION

Identity as the core of enterprise mobility

Required privileges and permissions

How to Configure Authentication and Access Control (AAA)

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

Software Security and Exploitation

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1811

Bojan Ždrnja, CISSP, GCIA, GCIH, GWAPT INFIGO IS

Network Security: Kerberos. Tuomas Aura

Token Kidnapping. Cesar Cerrudo Argeniss

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection

Security Fundamentals for your Privileged Account Security Deployment

SQL Server Security. Marek

10 FOCUS AREAS FOR BREACH PREVENTION

RastaLabs Red Team Simulation Lab

CPSC 467b: Cryptography and Computer Security

TLS Client Certificate and Smart Card Logon

Mapping BeyondTrust Solutions to

Network Security Essentials

Advanced Security Measures for Clients and Servers

Active Directory Auditing Guide

CSCI 667: Concepts of Computer Security. Lecture 9. Prof. Adwait Nadkarni

Cross-realm trusts with FreeIPA v3

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

You are not allowed to use any means of aid. However, according to general rules printed English language dictionaries are allowed.

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus

Advanced iscsi Management April, 2008

10 Ways Credit Unions Get PWNED

PLANNING AZURE INFRASTRUCTURE SECURITY - AZURE ADMIN ACCOUNTS PROTECTION & AZURE NETWORK SECURITY

GOING WHERE NO WAFS HAVE GONE BEFORE

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT

Security Handshake Pitfalls

Single Sign-On Showdown

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Hackproof Your Cloud Responding to 2016 Threats

MCSM:Directory2012 MCM:Directory2008 MVP:Enterprise Security Certified Ethical Hacker CISA.

Administration Of Active Directory Schema Version Checking

Microsoft Exam

Transcription:

Computers Gone Rogue Abusing Computer Accounts to Gain Control in an Active Directory Environment Marina Simakov & Itai Grady

Motivation Credentials are a high value target for attackers No need for 0-day exploits Easy to move laterally in the network Main focus user & service accounts Highest privileges What about computer accounts? Can they cause significant damage? Are they properly monitored? Should they be? (Clue: YES!)

Agenda Abusing computer accounts during different attack stages: Reconnaissance Lateral movement Persistence Demo Mitigations

Attack Flow Domain Account or Local System Access Pass-The-Hash Pass-The-Ticket ACL Manipulation Domain Admin Enterprise Admin NO ACCESS PIVOTING PRIVILEGED PERSISTENCE BUSTED!

Attack Flow: Reconnaissance Pre-created computer accounts Create an AD computer object under the desired OU Join the physical machine later Why? Users are not authorized to add new computers to the domain Placing the account in the OU with the desired GPOs Problem Pre-created computer accounts with an easy\empty password Corresponding physical machine is never joined to the domain Password is never changed!

Attack Flow: Reconnaissance Scan AD to get all computer accounts Find accounts with an empty\easy password: Logon Computer accounts have a ServicePrincipalName! => Kerberos TGS request => Try to decrypt ticket Nathan Muggli, Mark Gamache (@markgamachenerd)

Attack Flow: Lateral Movement SMB relay using Man-in-the-middle technique (i.e. Responder) Move laterally to various servers Mitigation enforce signed SMB traffic Traffic must be signed with a User session key known only to the client/server http://www.cyberdefensemagazine.com/ms-patch-tuesday-fixes-19-critical-issues-including-two-ntlmzero-day-flaws/

Bypass signed SMB traffic - CVE-2015-0005 UserSessionKey is calculated by the client/user Sent to the server by the DC over their secure channel UserSessionKey is based on user s secret key Vulnerability attacker with a compromised machine account can open a secure channel on behalf of other servers Use the fake secure channel to get the UserSessionKey

Accessing Domain Controller - CVE-2017-8563 Relay authentication request of a domain admin to a Windows LDAP server Using LDAPS protocol Get an administrative LDAPS session

Attack Flow: Persistence Trust the computer account for delegation => Request tickets on behalf of other users Allow delegation to krbtgt => Request TGTs on behalf of other users

Attack Flow: Persistence ACL Manipulation (@_wald0, @harmj0y) Deny Read useraccountcontrol permission from everyone Deny Read msds-allowedtodelegateto permissions from everyone

Attack Flow: Persistence We now have a computer account which: Is not a member of any sensitive groups Can obtain an administrative TGT at any time Doesn t look suspicious in scans Having control of a high privileged account is no longer required Machine password will not change

DEMO

Mitigations Reconnaissance phase If an attacker can do it, so can we! => Scan for pre-created computer accounts => Delete machine account \ join physical machine Monitor massive failed logons \ massive ticket retrieval Lateral movement phase Patch patch patch!

Mitigations Persistence Delegation: Monitor accounts trusted for delegation To which SPNs the account is allowed to delegate Account is sensitive and cannot be delegated Visibility: Hidden attributes: Monitor ACLs! Hidden objects: You might not see the account in AD, but you can see the traffic it generates

Mitigations Visibility: LsaLookupSids API: Given a SID, returns the account name No access check required to perform the mapping Scan to see what you cannot see Scan all SIDs, compare to LDAP query results https://cloudblogs.microsoft.com/microsoftsecure/2017/10/11/what-am-imissing-how-to-see-the-users-youre-denied-from-seeing/ (@MichaelDubinsky)

Thank you!