Skip to content

Latest commit

 

History

History
84 lines (66 loc) · 6.26 KB

README.md

File metadata and controls

84 lines (66 loc) · 6.26 KB

ThingsHackersLikeinAD

Some Things that hackers like in an AD environment

About:

This is a brief description about some security flaws in MS Active Directory. The goal is so wake up admins, that aren't aware of these to make their environments more robust and increasing overall IT-security. For more detailed information please search the internet or use any provided link. You can also find more about this topic on youtube. I recommend this channel:

Checking:

To check your environment yourself, you might use tools like:

Actual weaknesses

standard Domain Users can join Computers to AD

By default (at least the last 20 years) a standard domain user, with no special privileges, is allowed to join up to ten computers to your Active Directory. This is still the default setting in Domains that are freshly setup and can lead to untrusted to be computers joined to your environment. The good news is, this can be prevented by adjusting your "Default Domain"-policy: Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> find the entry named "Add workstations to the domain" and/or by adjusting the value "ms-DS-MachineAccountQuota" of your domain using the ADSI-Editor

Links:

Using high privileged Domain Accounts on Client systems

You should never, ever use any high privileged Domain Account (like e.g. YOURDOMAIN\Administrator) to do things on clients, as your credentials can be stolen by local system accounts that are member of the "Administrators"-group.

AD-Administrative groups

You might know that members of "Domain Admins"-group are very powerful, as they can change everything in your AD-Domain, but did you know there are plenty more groups that have rights that are very powerful as well? e.g.: "Enterprise Admins", "Backup Operators", "Print Operators". You should really keep track of who is member of this groups and don't overlook any nested groups.

Change your krbtgt-accounts password frequently. really. do this.

In most environments the password for the built-in account "krbtgt" never ever gets changed. As this account is used to sign kerberos-tokens it is a high value target for attackers. If an attacker gets his hands on the NTLM-Hash of this account's-password, he/she is able to craft golden tickets, which allow access to everything for a timeperiod of up to 10 years! Therefore, you really should change the password for this account frequently and do it twice (i suggest one day after another) as the last two passwords are cached.

Accounts without Kerberos-PreAuth

Any Account that has Kerberos-PreAuthentication disabled is a serious security risk. You should avoid them whenever possible. Check that noone is member of the "Pre-Windows-2000-compatibility" group and that no account has the flag set.

User accounts with SPNs defined

Computer accounts change their passwords every 30 days to a new random, 128 character long string. Different to that, the most user accounts and accounts an admin creates for a specific job, have a password which is significantly weaker than this and won't change that often. If a user-account has a service principle name (SPN) defined, this weakness can be abused for a so called "kerberoast"-attack allowing an attacker to gain valid credentials for this account and therefore get an intial foothold into your environment.

local administrator passwords

Not really an AD topic but it will affect your AD security. You should avoid to use the same password for client-local administrative accounts on different machines, as the NTLM-hashes will be the same. An attacker who might gain credentials on one client, can effectively use them on other machines as well. This way attackers can make their way through your environment. To prevent this you might want to use Microsoft LAPS

Smartcard/Certificate-based privilege escalation

misconfigured certificate-templates can be abused by users with local administrative permissions, to gain domain administrator.

An attacker could possibly make a certificate request with an alternative name (e.g. "[email protected]). If the certificate authority issues an certificate, this can be abused within a virtual smartcard which then can be used to authenticate against server. The server will trust the smartcard, as it is signed by a trusted CA.

Commands to be used on attacker side: TpmVscMgr create /name MyVSC /pin default /adminkey random /generate

certutil -csp “Microsoft Base Smart Card Crypto Provider” -importpfx C:_INSTALL\WSCert.pfx

runas /user:[email protected] /smartcard cmd PIN = 12345678

From DNS-Admin to Domain Takeover

You must be aware that DNS-Administrators (or anyone who has write-access to the DNS-Server-object) is able to load .dll's with the DNS-service. As the DNS-service is running as SYSTEM, this allows for a privilege escalation to domain administrator. More on that topic can be found here

Example code: google