SlideShare a Scribd company logo
1 of 46
Purpose Driven Hunt
What do I do with all this data?
@jaredcatkinson
▪ Adversary Detection Tech Lead @ SpecterOps
▪ Developer:
▫ PowerForensics
▫ Uproot
▫ ACE
▫ PSReflect-Functions
▪ Microsoft Cloud and Datacenter Management MVP
▪ Former:
▫ U.S. Air Force Hunt Team
▫ Veris Group Adaptive Threat Division
@robwinchester3
▪ Adversary Detection Lead @ SpecterOps
▪ Contributor:
▫ Co-author of ACE
▫ HELK
▪ Former:
▫ U.S. Air Force Red Team
▫ Veris Group Adaptive Threat Division
Overview
▪ What is “Hunt”?
▪ Attacker TTP
▪ Creating useful hypotheses
▪ Case Study
▫ Detecting Golden Tickets
What is “Hunt”?
▪ Actively searching for malicious activity in the environment
that has evaded current in place defenses
▪ Rooted in the Assume Breach mindset
Generic Hunt Process
Problems with the
“Generic Hunt Process”
▪ Gather data
▫ What data to collect?
▫ Why collect that data?
▫ Splunk is expensive
▫ ELK is technically free… but costs time
▪ Hunt for “bad”
▫ What are you looking for in the gathered data?
▫ What is “good” activity that can be ignored?
▫ How much time do you have to search through the data?
▫ Have to balance time hunting and time investigating
Hypothesis driven hunting
Hypothesis driven hunting benefits
▪ Focuses data collection efforts
▪ Provides a specific goal for the hunt
team
▪ Helps eliminate analysis paralysis
▪ Track hypotheses over time
Great, so how do I make hypotheses?
▪ This is the focus of this presentation!
▪ We will walk you through how to make a hunt hypothesis that
will actually result in something tangible
▪ Will do practical demonstration on using this process to
create and execute a hypothesis for Golden Tickets
First, what are we looking for?
▪ Assume Breach
▫ Tons of organizations have been breached
▫ It’s a matter of WHEN not IF a breach will occur
▪ Focus on post exploitation activity
▫ Most in place defensive tools focus on stopping/detecting the initial attack
from occurring
■ Firewalls, AV, and IDS
▫ If you can stop the attack before the objective is achieved, the attack is still
stopped
MITRE Cyber Attack Lifecycle
MITRE ATT&CK Framework
▪ A body of knowledge for cataloging an adversary activity
during the attack cycle
▫ Similar to how OWASP defines application security vulnerabilities
▫ Used as a reference for both offense and defense
▫ Includes Windows, Linux, and MacOS
▪ Categories loosely correspond to the attack cycle
▫ Persistence
▫ Lateral Movement
▫ Credential Access, etc.
▪ https://attack.mitre.org/wiki/Main_Page
MITRE ATT&CK Matrix
▪ Tactics
▫ Sorted by column headers
▪ Techniques
▫ Represented by individual entries in ATTACK Matrix
▪ 217 techniques currently addressed
▪ Windows, Linux and MacOS
Tactics & Techniques
Procedures
▪ In the detailed information of each technique specific
examples or threats are included as available
▪ Not all procedures represented, large and growing set of
data
Why is this useful?
▪ Focus on detecting the behaviors, not
hashes & specific tool signatures
▪ Reference throughout the hunt
hypothesis process
▪ Tracking hunt history
▪ Plan/chart future hunt activity
▪ Identify areas lacking coverage
Enter The Hunt Hypothesis
Our Hunt Process
5 step process to help create meaningful hunt hypothesis
Intended to be used to create hunt hypotheses to be completed
in one week
1.Identify the Tactic & Technique
2.Identify the Procedure(s)
3.Identify Collection Requirements
4.Identify the Scope
5.Document Excluded Factors
Phase 1: Identify the Tactic & Technique
▪ High level what you are looking for
▪ Used to track hunt interests over
time in environment (tactics)
▪ Lots of attacks will utilize numerous
Tactics & Technique
▫ Specifically focus your efforts
Phase 2: Identify the Procedures
▪ Specific examples and implementations of the selected
technique
▪ Frequently found in APT reports, threat intelligence, etc
▪ Understand and examine the different procedures
▪ What can and cannot be easily changed across all the
procedures?
▪ Perform research to understand the basic concepts of the
procedures
Phase 3: Identify Collection Requirements
▪ Bulk of the research time
▪ Replicate malicious activity in lab environment
▪ Identify common behaviors
▪ Identify high false positives
▫ If possible test in small portion of actual network
▪ Should result in a POC which gathers the required data
Phase 4: Identify the Scope
▪ Two factors for scope
▫ Time
■ Amount of time to perform the hunt assessment
■ We recommend a week
▫ Number of data sources to collect
■ Can be host or network information
■ How much data can be collected in the timeframe?
■ How much data can be analyzed in the timeframe?
▪ Primarily based on collection requirements
▪ Scope may be limited due to limited collection capability
Phase 5: Document Excluded Factors
▪ What things were you unable to include in the hypothesis at
each level?
▫ What TTPs were not able to be researched during this hunt?
▫ Technical collection limitations?
▫ Political limitations?
▫ Scope limitations?
▪ Will feed future hunt hypotheses
▪ Informs future technology purchasing
▪ Quantifies the effects of scope limitation
What do we have at the end?
▪ Specific behavior being “hunted” for in
the environment
▪ Understanding of the attack
▪ Knowledge of the data required to detect
the activity
Benefit of this process
▪ Focuses hunt efforts to have an
tangible result
▪ Incremental improvement of security
over time
▪ Can identify techniques in use from
threat reports and know what you
have put into place
Case Study
My CISO went to Black Hat
▪ Our situation:
▫ Small Security Budget
▫ No EDR (agent-based monitoring)
▫ Poor Lateral Network Visibility
▫ Lots of Local Admins
▪ Our task:
▫ Can we detect it?
▫ Can we stop it?
▫ Have we been affected by it?
▪ Our reality:
▫ Don’t want to focus on mimikatz itself, but its techniques.
Phase 1 - Tactic & Technique
▪ Mimikatz is commonly used for:
▫ Credential Access
■ Credential Dumping (Domain and Local)
■ Account Manipulation
■ Security Support Provider
▫ Lateral Movement
■ Pass the Ticket
■ Pass the Hash
▪ Tactic - Lateral Movement
▫ Mechanism to move between systems after initial access has been gained
▪ Technique - Pass the Ticket
▫ Authenticating to network resources with Kerberos tickets without the account’s
password
https://adsecurity.org/?p=1515
https://adsecurity.org/?p=1515
https://adsecurity.org/?p=1515
Phase 2 - Identify the Procedures
▪ Technique - Pass the Ticket
▫ Golden Ticket - Forged Authentication Service (AS) tickets (TGT)
■ Request legitimate service tickets
■ Uses the krbtgt account hash
▫ Silver Ticket - Forged Ticket Granting Service (TGS) tickets
■ Access network resources
■ Uses the computer or service account hash
▪ Procedure - Golden Tickets
▫ A golden ticket allows for the creation of LEGITIMATE service tickets
▫ Common Kill Chain:
■ Privilege Escalation -> Cred Dump -> DCSync -> Golden Ticket -> Legit
Service Ticket -> Lateral Movement
Phase 3 - Collection Requirements
▪Interact w/ Mimikatz to see effect on tickets
▪Collect relevant data points
▫ Logon Sessions
▫ Ticket Granting Tickets
Ticket Lifetime
▪ Default Valid Ticket Lifetime is 10 hours
▫ Mimikatz default ticket lifetime is 10 years
▪ Default can be set for:
▫ Service Tickets (TGS): 0 - 99,999 minutes
▫ User Tickets (TGT): 0 - 99,999 hours
▪ Ticket Lifetime can be set at:
▫ Domain Security Policy -> Windows Settings -> Security Settings -> Account
Policies -> Kerberos Policy
■ Maximum lifetime for user ticket
■ Maximum lifetime for service ticket
Ticket Lifetime ~10 hours
Renewal Lifetime
▪ Default Ticket Renewal Lifetime is 7 days
▫ Mimikatz default is 10 years
▪ Can be set anywhere from 0 - 99,999 days
▪ Ticket Renewal Lifetime can be set at:
▫ Domain Security Policy -> Windows Settings -> Security Settings -> Account
Policies -> Kerberos Policy
■ Maximum lifetime for user ticket renewal
Ticket Lifetime ~7 days
Ticket Encryption Type
▪ Portions of the Ticket are Encrypted
▪ Encryption Type used is based on two factors
▫ The Domain Functional Level
▫ The hash type used to create the ticket
▪ AES256-HMAC Encryption
▫ Uses krbtgt AES(128/256) key
▫ The norm for the majority of legitimate modern tickets
▪ RC4 Encryption
▫ Uses krbtgt NTLM hash
▫ Common with Inter-Forest/Domain tickets
Encryption aes256_cts_hmac_sha1_96
Logon Session vs. Ticket Client
▪ Each (Kerberos) Logon Session has a Ticket Granting Ticket
▪ Generally speaking, TGT Client should be the same as the
logon session owner
▪ Exception:
▫ New Credential (runas /netonly) Type Logons
■ LogonUser with LOGON32_LOGON_NEW_CREDENTIALS Flag
Collection Requirements
▪Enumerate Logon Sessions
▫ User Name
▫ User Principal Name (UPN)
▫ LogonId
▫ LogonType
▫ Authentication Package
▪Enumerate TGT in each Logon Session
▫ Ticket Service == krbtgt
▫ Ticket Client/Domain
▫ Start/End Time
▫ Renew Until Time
▫ Encryption Type
Demo 1 (Thanks Sean Metcalf)
https://youtu.be/VymvF2IyTFI
Phase 4 - Identify the Scope
▪ Our Timeframe:
▫ One week of execution
▪ Our Environment:
▫ 3 Domains
▫ 1 Linux Computers (non-Domain joined)
▫ 12 Windows Computers
▫ No Sensitive Production Systems
▪ Our Scope:
▫ Windows systems (7)
▫ 2 domains (no creds for 3rd domain)
Phase 5 - Document Excluded Factors
▪ Credential Theft Attacks
▫ Credential Dumping
▫ Account Manipulation
▫ Security Support Providers
▪ Lateral Movement
▫ Golden Tickets
■ Event logs
■ Network Traffic
■ Kerberos Tickets on Linux Systems
▫ Silver Tickets
▫ Pass the Hash (Local Authentication)
▪Scope
▫ Lacked credentials for Linux system and 3rd domain
Demo 2
https://youtu.be/qBlIotCSS28
Future Developments
▪ Silver Ticket Detection
▫ Encryption Type
▫ Ticket Lifetime
▫ Renewal Window
▪ Klist.exe KDC Called field
Parting Thoughts
▪ Don’t bite off more than you can chew
▫ “Detect adversary Golden Ticket use” vs. “find bad guys”
▪ No “Golden Bullet”
▫ Perfectly Forged Tickets
▪ Iterative Process
▫ Adjust detection as you learn
▫ Adjust detection to your environment
▪ Don’t settle for one detection technique
▫ Local Ticket Cache (this case study)
▫ Event Logs
▫ Network Requests
Resources
▪ Get-KerberosTicketGrantingTicket
▫ http://bit.ly/2wzhGvs
▪ Test-Ticket
▫ http://bit.ly/2fcwFR9
▪ Detecting Forged Kerberos Tickets
▫ https://adsecurity.org/?p=1515
▪ Pass-the-Ticket Technique (MITRE ATT&CK)
▫ https://attack.mitre.org/wiki/Technique/T1097

More Related Content

What's hot

Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guysNick Landers
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELKTripwire
 
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniquesAd, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniquesGuglielmo Scaiola
 
Minions
MinionsMinions
Minionssixdub
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014chrissanders88
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014grecsl
 
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016Daniel Bohannon
 
In the Wake of Kerberoast
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoastken_kitahara
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan KnudsenTI Safe
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active DirectorySunny Neo
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Andrew Case
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]RootedCON
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014grecsl
 
PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016Russel Van Tuyl
 
External to DA, the OS X Way
External to DA, the OS X WayExternal to DA, the OS X Way
External to DA, the OS X WayStephan Borosh
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Danny Akacki
 
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...CODE BLUE
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheapAnjum Ahuja
 
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
An ACE in the Hole - Stealthy Host Persistence via Security DescriptorsAn ACE in the Hole - Stealthy Host Persistence via Security Descriptors
An ACE in the Hole - Stealthy Host Persistence via Security DescriptorsWill Schroeder
 

What's hot (20)

Outlook and Exchange for the bad guys
Outlook and Exchange for the bad guysOutlook and Exchange for the bad guys
Outlook and Exchange for the bad guys
 
My Bro The ELK
My Bro The ELKMy Bro The ELK
My Bro The ELK
 
Ad, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniquesAd, mimikatz, ata and (awe)some evasion techniques
Ad, mimikatz, ata and (awe)some evasion techniques
 
Minions
MinionsMinions
Minions
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014Applied Detection and Analysis Using Flow Data - MIRCon 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at CactusCon on April 4, 2014
 
Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016Invoke-Obfuscation DerbyCon 2016
Invoke-Obfuscation DerbyCon 2016
 
In the Wake of Kerberoast
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoast
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
 
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
Malware Analysis 101 - N00b to Ninja in 60 Minutes at Notacon on April 12, 2014
 
PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016
 
External to DA, the OS X Way
External to DA, the OS X WayExternal to DA, the OS X Way
External to DA, the OS X Way
 
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
 
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
[CB16] Invoke-Obfuscation: PowerShell obFUsk8tion Techniques & How To (Try To...
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Hunting on the cheap
Hunting on the cheapHunting on the cheap
Hunting on the cheap
 
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
An ACE in the Hole - Stealthy Host Persistence via Security DescriptorsAn ACE in the Hole - Stealthy Host Persistence via Security Descriptors
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
 

Similar to Purpose Driven Hunt Detecting Golden Tickets

The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security AnalyticsDemetrio Milea
 
Hacktive Directory Forensics - HackCon18, Oslo
Hacktive Directory Forensics - HackCon18, OsloHacktive Directory Forensics - HackCon18, Oslo
Hacktive Directory Forensics - HackCon18, OsloYossi Sassi
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeLancope, Inc.
 
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsEmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsFaithWestdorp
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedFalgun Rathod
 
Shytikov on NTLM Authentication
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authenticationshytikov
 
SplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdfSplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdfTuynNguyn819213
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturityDNIF
 
MITRE-Module 3 Slides.pdf
MITRE-Module 3 Slides.pdfMITRE-Module 3 Slides.pdf
MITRE-Module 3 Slides.pdfReZa AdineH
 
1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale1. Network Security Monitoring Rationale
1. Network Security Monitoring RationaleSam Bowne
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence Sam Bowne
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)Dinis Cruz
 
How Networking works with Data Science
How Networking works with Data Science How Networking works with Data Science
How Networking works with Data Science HungWei Chiu
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleGuardicore
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraftenigma0x3
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclavefluturads
 

Similar to Purpose Driven Hunt Detecting Golden Tickets (20)

The Golden Rules - Detecting more with RSA Security Analytics
The Golden Rules  - Detecting more with RSA Security AnalyticsThe Golden Rules  - Detecting more with RSA Security Analytics
The Golden Rules - Detecting more with RSA Security Analytics
 
Hacktive Directory Forensics - HackCon18, Oslo
Hacktive Directory Forensics - HackCon18, OsloHacktive Directory Forensics - HackCon18, Oslo
Hacktive Directory Forensics - HackCon18, Oslo
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash PluginsEmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
EmPOW: Integrating Attack Behavior Intelligence into Logstash Plugins
 
Real life hacking101
Real life hacking101Real life hacking101
Real life hacking101
 
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private LimitedThreat Hunting by Falgun Rathod - Cyber Octet Private Limited
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
 
Coporate Espionage
Coporate EspionageCoporate Espionage
Coporate Espionage
 
Shytikov on NTLM Authentication
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authentication
 
SplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdfSplunkApplicationLoggingBestPractices_Template_2.3.pdf
SplunkApplicationLoggingBestPractices_Template_2.3.pdf
 
Threat hunting and achieving security maturity
Threat hunting and achieving security maturityThreat hunting and achieving security maturity
Threat hunting and achieving security maturity
 
MITRE-Module 3 Slides.pdf
MITRE-Module 3 Slides.pdfMITRE-Module 3 Slides.pdf
MITRE-Module 3 Slides.pdf
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale1. Network Security Monitoring Rationale
1. Network Security Monitoring Rationale
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)How to not fail at security data analytics (by CxOSidekick)
How to not fail at security data analytics (by CxOSidekick)
 
How Networking works with Data Science
How Networking works with Data Science How Networking works with Data Science
How Networking works with Data Science
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
Bridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial TradecraftBridging the Gap: Lessons in Adversarial Tradecraft
Bridging the Gap: Lessons in Adversarial Tradecraft
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclave
 

More from Jared Atkinson

Red + Blue, How Purple Are You
Red + Blue, How Purple Are YouRed + Blue, How Purple Are You
Red + Blue, How Purple Are YouJared Atkinson
 
Mapping Detection Coverage
Mapping Detection CoverageMapping Detection Coverage
Mapping Detection CoverageJared Atkinson
 
Automated, Collection, and Enrichment (ACE)
Automated, Collection, and Enrichment (ACE)Automated, Collection, and Enrichment (ACE)
Automated, Collection, and Enrichment (ACE)Jared Atkinson
 
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)Jared Atkinson
 
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShellJared Atkinson
 
44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensics44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensicsJared Atkinson
 

More from Jared Atkinson (6)

Red + Blue, How Purple Are You
Red + Blue, How Purple Are YouRed + Blue, How Purple Are You
Red + Blue, How Purple Are You
 
Mapping Detection Coverage
Mapping Detection CoverageMapping Detection Coverage
Mapping Detection Coverage
 
Automated, Collection, and Enrichment (ACE)
Automated, Collection, and Enrichment (ACE)Automated, Collection, and Enrichment (ACE)
Automated, Collection, and Enrichment (ACE)
 
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
BSidesDC - **** it, Do It Live (PowerShell Digital Forensics)
 
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
44CON London 2015: Old Dog, New Tricks: Forensics with PowerShell
 
44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensics44CON London 2015: NTFS Analysis with PowerForensics
44CON London 2015: NTFS Analysis with PowerForensics
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Purpose Driven Hunt Detecting Golden Tickets

  • 1. Purpose Driven Hunt What do I do with all this data?
  • 2. @jaredcatkinson ▪ Adversary Detection Tech Lead @ SpecterOps ▪ Developer: ▫ PowerForensics ▫ Uproot ▫ ACE ▫ PSReflect-Functions ▪ Microsoft Cloud and Datacenter Management MVP ▪ Former: ▫ U.S. Air Force Hunt Team ▫ Veris Group Adaptive Threat Division
  • 3. @robwinchester3 ▪ Adversary Detection Lead @ SpecterOps ▪ Contributor: ▫ Co-author of ACE ▫ HELK ▪ Former: ▫ U.S. Air Force Red Team ▫ Veris Group Adaptive Threat Division
  • 4. Overview ▪ What is “Hunt”? ▪ Attacker TTP ▪ Creating useful hypotheses ▪ Case Study ▫ Detecting Golden Tickets
  • 5. What is “Hunt”? ▪ Actively searching for malicious activity in the environment that has evaded current in place defenses ▪ Rooted in the Assume Breach mindset
  • 7. Problems with the “Generic Hunt Process” ▪ Gather data ▫ What data to collect? ▫ Why collect that data? ▫ Splunk is expensive ▫ ELK is technically free… but costs time ▪ Hunt for “bad” ▫ What are you looking for in the gathered data? ▫ What is “good” activity that can be ignored? ▫ How much time do you have to search through the data? ▫ Have to balance time hunting and time investigating
  • 9. Hypothesis driven hunting benefits ▪ Focuses data collection efforts ▪ Provides a specific goal for the hunt team ▪ Helps eliminate analysis paralysis ▪ Track hypotheses over time
  • 10. Great, so how do I make hypotheses? ▪ This is the focus of this presentation! ▪ We will walk you through how to make a hunt hypothesis that will actually result in something tangible ▪ Will do practical demonstration on using this process to create and execute a hypothesis for Golden Tickets
  • 11. First, what are we looking for? ▪ Assume Breach ▫ Tons of organizations have been breached ▫ It’s a matter of WHEN not IF a breach will occur ▪ Focus on post exploitation activity ▫ Most in place defensive tools focus on stopping/detecting the initial attack from occurring ■ Firewalls, AV, and IDS ▫ If you can stop the attack before the objective is achieved, the attack is still stopped
  • 12. MITRE Cyber Attack Lifecycle
  • 13. MITRE ATT&CK Framework ▪ A body of knowledge for cataloging an adversary activity during the attack cycle ▫ Similar to how OWASP defines application security vulnerabilities ▫ Used as a reference for both offense and defense ▫ Includes Windows, Linux, and MacOS ▪ Categories loosely correspond to the attack cycle ▫ Persistence ▫ Lateral Movement ▫ Credential Access, etc. ▪ https://attack.mitre.org/wiki/Main_Page
  • 15. ▪ Tactics ▫ Sorted by column headers ▪ Techniques ▫ Represented by individual entries in ATTACK Matrix ▪ 217 techniques currently addressed ▪ Windows, Linux and MacOS Tactics & Techniques
  • 16. Procedures ▪ In the detailed information of each technique specific examples or threats are included as available ▪ Not all procedures represented, large and growing set of data
  • 17. Why is this useful? ▪ Focus on detecting the behaviors, not hashes & specific tool signatures ▪ Reference throughout the hunt hypothesis process ▪ Tracking hunt history ▪ Plan/chart future hunt activity ▪ Identify areas lacking coverage
  • 18. Enter The Hunt Hypothesis
  • 19. Our Hunt Process 5 step process to help create meaningful hunt hypothesis Intended to be used to create hunt hypotheses to be completed in one week 1.Identify the Tactic & Technique 2.Identify the Procedure(s) 3.Identify Collection Requirements 4.Identify the Scope 5.Document Excluded Factors
  • 20. Phase 1: Identify the Tactic & Technique ▪ High level what you are looking for ▪ Used to track hunt interests over time in environment (tactics) ▪ Lots of attacks will utilize numerous Tactics & Technique ▫ Specifically focus your efforts
  • 21. Phase 2: Identify the Procedures ▪ Specific examples and implementations of the selected technique ▪ Frequently found in APT reports, threat intelligence, etc ▪ Understand and examine the different procedures ▪ What can and cannot be easily changed across all the procedures? ▪ Perform research to understand the basic concepts of the procedures
  • 22. Phase 3: Identify Collection Requirements ▪ Bulk of the research time ▪ Replicate malicious activity in lab environment ▪ Identify common behaviors ▪ Identify high false positives ▫ If possible test in small portion of actual network ▪ Should result in a POC which gathers the required data
  • 23. Phase 4: Identify the Scope ▪ Two factors for scope ▫ Time ■ Amount of time to perform the hunt assessment ■ We recommend a week ▫ Number of data sources to collect ■ Can be host or network information ■ How much data can be collected in the timeframe? ■ How much data can be analyzed in the timeframe? ▪ Primarily based on collection requirements ▪ Scope may be limited due to limited collection capability
  • 24. Phase 5: Document Excluded Factors ▪ What things were you unable to include in the hypothesis at each level? ▫ What TTPs were not able to be researched during this hunt? ▫ Technical collection limitations? ▫ Political limitations? ▫ Scope limitations? ▪ Will feed future hunt hypotheses ▪ Informs future technology purchasing ▪ Quantifies the effects of scope limitation
  • 25. What do we have at the end? ▪ Specific behavior being “hunted” for in the environment ▪ Understanding of the attack ▪ Knowledge of the data required to detect the activity
  • 26. Benefit of this process ▪ Focuses hunt efforts to have an tangible result ▪ Incremental improvement of security over time ▪ Can identify techniques in use from threat reports and know what you have put into place
  • 28. My CISO went to Black Hat ▪ Our situation: ▫ Small Security Budget ▫ No EDR (agent-based monitoring) ▫ Poor Lateral Network Visibility ▫ Lots of Local Admins ▪ Our task: ▫ Can we detect it? ▫ Can we stop it? ▫ Have we been affected by it? ▪ Our reality: ▫ Don’t want to focus on mimikatz itself, but its techniques.
  • 29. Phase 1 - Tactic & Technique ▪ Mimikatz is commonly used for: ▫ Credential Access ■ Credential Dumping (Domain and Local) ■ Account Manipulation ■ Security Support Provider ▫ Lateral Movement ■ Pass the Ticket ■ Pass the Hash ▪ Tactic - Lateral Movement ▫ Mechanism to move between systems after initial access has been gained ▪ Technique - Pass the Ticket ▫ Authenticating to network resources with Kerberos tickets without the account’s password
  • 33. Phase 2 - Identify the Procedures ▪ Technique - Pass the Ticket ▫ Golden Ticket - Forged Authentication Service (AS) tickets (TGT) ■ Request legitimate service tickets ■ Uses the krbtgt account hash ▫ Silver Ticket - Forged Ticket Granting Service (TGS) tickets ■ Access network resources ■ Uses the computer or service account hash ▪ Procedure - Golden Tickets ▫ A golden ticket allows for the creation of LEGITIMATE service tickets ▫ Common Kill Chain: ■ Privilege Escalation -> Cred Dump -> DCSync -> Golden Ticket -> Legit Service Ticket -> Lateral Movement
  • 34. Phase 3 - Collection Requirements ▪Interact w/ Mimikatz to see effect on tickets ▪Collect relevant data points ▫ Logon Sessions ▫ Ticket Granting Tickets
  • 35. Ticket Lifetime ▪ Default Valid Ticket Lifetime is 10 hours ▫ Mimikatz default ticket lifetime is 10 years ▪ Default can be set for: ▫ Service Tickets (TGS): 0 - 99,999 minutes ▫ User Tickets (TGT): 0 - 99,999 hours ▪ Ticket Lifetime can be set at: ▫ Domain Security Policy -> Windows Settings -> Security Settings -> Account Policies -> Kerberos Policy ■ Maximum lifetime for user ticket ■ Maximum lifetime for service ticket Ticket Lifetime ~10 hours
  • 36. Renewal Lifetime ▪ Default Ticket Renewal Lifetime is 7 days ▫ Mimikatz default is 10 years ▪ Can be set anywhere from 0 - 99,999 days ▪ Ticket Renewal Lifetime can be set at: ▫ Domain Security Policy -> Windows Settings -> Security Settings -> Account Policies -> Kerberos Policy ■ Maximum lifetime for user ticket renewal Ticket Lifetime ~7 days
  • 37. Ticket Encryption Type ▪ Portions of the Ticket are Encrypted ▪ Encryption Type used is based on two factors ▫ The Domain Functional Level ▫ The hash type used to create the ticket ▪ AES256-HMAC Encryption ▫ Uses krbtgt AES(128/256) key ▫ The norm for the majority of legitimate modern tickets ▪ RC4 Encryption ▫ Uses krbtgt NTLM hash ▫ Common with Inter-Forest/Domain tickets Encryption aes256_cts_hmac_sha1_96
  • 38. Logon Session vs. Ticket Client ▪ Each (Kerberos) Logon Session has a Ticket Granting Ticket ▪ Generally speaking, TGT Client should be the same as the logon session owner ▪ Exception: ▫ New Credential (runas /netonly) Type Logons ■ LogonUser with LOGON32_LOGON_NEW_CREDENTIALS Flag
  • 39. Collection Requirements ▪Enumerate Logon Sessions ▫ User Name ▫ User Principal Name (UPN) ▫ LogonId ▫ LogonType ▫ Authentication Package ▪Enumerate TGT in each Logon Session ▫ Ticket Service == krbtgt ▫ Ticket Client/Domain ▫ Start/End Time ▫ Renew Until Time ▫ Encryption Type
  • 40. Demo 1 (Thanks Sean Metcalf) https://youtu.be/VymvF2IyTFI
  • 41. Phase 4 - Identify the Scope ▪ Our Timeframe: ▫ One week of execution ▪ Our Environment: ▫ 3 Domains ▫ 1 Linux Computers (non-Domain joined) ▫ 12 Windows Computers ▫ No Sensitive Production Systems ▪ Our Scope: ▫ Windows systems (7) ▫ 2 domains (no creds for 3rd domain)
  • 42. Phase 5 - Document Excluded Factors ▪ Credential Theft Attacks ▫ Credential Dumping ▫ Account Manipulation ▫ Security Support Providers ▪ Lateral Movement ▫ Golden Tickets ■ Event logs ■ Network Traffic ■ Kerberos Tickets on Linux Systems ▫ Silver Tickets ▫ Pass the Hash (Local Authentication) ▪Scope ▫ Lacked credentials for Linux system and 3rd domain
  • 44. Future Developments ▪ Silver Ticket Detection ▫ Encryption Type ▫ Ticket Lifetime ▫ Renewal Window ▪ Klist.exe KDC Called field
  • 45. Parting Thoughts ▪ Don’t bite off more than you can chew ▫ “Detect adversary Golden Ticket use” vs. “find bad guys” ▪ No “Golden Bullet” ▫ Perfectly Forged Tickets ▪ Iterative Process ▫ Adjust detection as you learn ▫ Adjust detection to your environment ▪ Don’t settle for one detection technique ▫ Local Ticket Cache (this case study) ▫ Event Logs ▫ Network Requests
  • 46. Resources ▪ Get-KerberosTicketGrantingTicket ▫ http://bit.ly/2wzhGvs ▪ Test-Ticket ▫ http://bit.ly/2fcwFR9 ▪ Detecting Forged Kerberos Tickets ▫ https://adsecurity.org/?p=1515 ▪ Pass-the-Ticket Technique (MITRE ATT&CK) ▫ https://attack.mitre.org/wiki/Technique/T1097

Editor's Notes

  1. Robby
  2. 1 Minute
  3. Originated in the Department of Defense Has become increasingly popular over the last few years
  4. Gather data Collect as much host and network information as you possibly can Put that data somewhere for analysis Hunt for “bad” Look for “malicious activity” in that set of data Find anomalies and investigate Repeat Continue this process and hope you find something
  5. 3 minutes
  6. Create hunt hypothesis Determine what you want to hunt for more specifically than “bad stuff” Gather data Collect data required to investigate the hypothesis Hunt for evidence of activity based on hypothesis Search through the data for evidence of the malicious activity described in the hypothesis
  7. 5 minutes
  8. MITRE ATT&CK Framework
  9. 10-12 min
  10. High Level Direction Initially, you can't do it all
  11. How to get there
  12. What you need to have along the way
  13. Agent vs Agentless Currently Collecting vs New data source
  14. 20-25 min
  15. Notional Situation
  16. KDC - Key Distribution Center AS - Authentication Service TGS - Ticket Granting Service
  17. Fix Scope