SlideShare a Scribd company logo
© A L S I D C O P Y R I G H T 2 0 2 1
Enumerating Active Directory:
Lateral Movement and Privilege Escalation
Security Evangelist & Microsoft MVP
AtTACK structure
© A L S I D C O P Y R I G H T 2 0 2 1
The attackers are looking for the easiest path into the network, then they
want to move laterally and gain privileges. Once obtained, they can spread
ransomware, steal data, and more.
1 2 3 4 5 6
Infect endpoint with
phishing or e-mail
attack, and gain local
admin privileges
Install payload, disable
local defense, start to
enumerate AD and the
network topology
Attempt to move
laterally, to other
endpoints, servers,
and devices
Exploit known
configurations to gain
privileges on different
servers using AD
Create backdoors and
persistence within AD
and other network
devices
Collect data and/or
encrypt data - Steal
data for economic
intelligence
Attack
Steps
Enumeration tools
© A L S I D C O P Y R I G H T 2 0 2 1
Bloodhound
PowerView
Ldapdomaindump
Adidnsdump
ACLight
ADRecon
Domains and trusts
Domain SID
Password Policy
DCs
Domain Users and attributes
Domain computers
Domain Groups and
Members
Shared folders
Group Policies
OUs
ACLs
Sessions
Local Admin Rights
…
AdminTo
MemberOf
HasSession
ForceChangePassword
AddMembers
CanRDP
CanPSRemote
ExecuteDCOM
SQLAdmin
AllowedToDelegate
GetChangesAll
GenericAll
WriteDacl
Owns
…
Sources:
https://bloodhound.readthedocs.io/en/latest/data-analysis/nodes.html
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet#useful-enumeration-tools
https://mcpmag.com/articles/2019/11/13/bloodhound-active-directory-domain-admin.aspx
Tools Objects/settings Actions/privileges
Analyzing the enumeration
© A L S I D C O P Y R I G H T 2 0 2 1
Leverage Unknown
Settings
- Kerberos
Delegations
- adminSDHolder
- adminCount
- SYSVOL
permissions
Leverage Cloud
Settings
- AAD Connect
permissions
- AAD Sync
- AAD SSO
- Bounce to Azure AD
Leverage Old
Settings
- Service Principal
Names
- Primary Group ID
- SIDHistory
- AD Delegations
- GP Delegations
ATTACKER strategy
© A L S I D C O P Y R I G H T 2 0 2 1
Enumeration of
Active Directory and
all settings
▪ AD is « old »
▪ AD installation was made
10+ years ago
▪ AD is changing every day
Analysis of AD to find
easiest target
▪ Attackers don’t analyze the
« world » with lines &
columns but with graphs
▪ Remember, every user has a
read access to AD
Leverage actions
which don’t log
▪ Security logs are not really
useful
▪ Attackers can bypass the
logs
▪ Attackers implement
backdoors under the SIEM
radar
In a nutshell
© A L S I D C O P Y R I G H T 2 0 2 1
▪ No users with
local admin rights
▪ Encrypt local disk
▪ Use LAPS (free)
▪ Implement EDR
▪ Harden your
endpoint
configuration
▪ Do not base your
security strategy
only on logs
▪ Implement
Microsoft Tier-
model
▪ Detect in real-
time AD security
deviances &
Attack paths
▪ Detect in real-
time AD attacks
Final advice: Doubt about yourself ! Too much self-
confidence is the first enemy of cybersecurity…
© A L S I D C O P Y R I G H T 2 0 2 0
alsid.com
you.

More Related Content

Similar to Enumerating Active Directory: Lateral Movement and Privilege Escalation

Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
Prabath Siriwardena
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax
 
CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market Overview
CloudIDSummit
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solution
Cloudera, Inc.
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
TheAnfieldGroup
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
langkahgontay88
 
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
AWS Chicago
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
Adam Doyle
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
EDB
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
lior mazor
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
vngundi
 
SDX Pitch Deck (201) - Apresentação SDP 2024
SDX Pitch Deck (201) - Apresentação SDP 2024SDX Pitch Deck (201) - Apresentação SDP 2024
SDX Pitch Deck (201) - Apresentação SDP 2024
PauloEduardoBitarJun
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
Brian A. McHenry
 
Escalation defenses ad guardrails every company should deploy
Escalation defenses ad guardrails every company should deployEscalation defenses ad guardrails every company should deploy
Escalation defenses ad guardrails every company should deploy
David Rowe
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
Skytap Cloud
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
Tiago de Almeida
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
Modern Data Stack France
 

Similar to Enumerating Active Directory: Lateral Movement and Privilege Escalation (20)

Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
DataStax | Best Practices for Securing DataStax Enterprise (Matt Kennedy) | C...
 
CIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market OverviewCIS13: Next Generation Privileged Identity Management: A Market Overview
CIS13: Next Generation Privileged Identity Management: A Market Overview
 
Get started with Cloudera's cyber solution
Get started with Cloudera's cyber solutionGet started with Cloudera's cyber solution
Get started with Cloudera's cyber solution
 
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
 
Snowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at ScaleSnowflake Data Science and AI/ML at Scale
Snowflake Data Science and AI/ML at Scale
 
Creating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres DatabaseCreating a Multi-Layered Secured Postgres Database
Creating a Multi-Layered Secured Postgres Database
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
SDX Pitch Deck (201) - Apresentação SDP 2024
SDX Pitch Deck (201) - Apresentação SDP 2024SDX Pitch Deck (201) - Apresentação SDP 2024
SDX Pitch Deck (201) - Apresentação SDP 2024
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Escalation defenses ad guardrails every company should deploy
Escalation defenses ad guardrails every company should deployEscalation defenses ad guardrails every company should deploy
Escalation defenses ad guardrails every company should deploy
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Vue d'ensemble Dremio
Vue d'ensemble DremioVue d'ensemble Dremio
Vue d'ensemble Dremio
 

More from Sylvain Cortes

Cybersécurité et Jeux d'Arcade
Cybersécurité et Jeux d'ArcadeCybersécurité et Jeux d'Arcade
Cybersécurité et Jeux d'Arcade
Sylvain Cortes
 
Spraykatz installation & basic usage
Spraykatz installation & basic usageSpraykatz installation & basic usage
Spraykatz installation & basic usage
Sylvain Cortes
 
aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...
aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...
aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...
Sylvain Cortes
 
Comment securiser votre annuaire Active Directory contre les attaques de malw...
Comment securiser votre annuaire Active Directory contre les attaques de malw...Comment securiser votre annuaire Active Directory contre les attaques de malw...
Comment securiser votre annuaire Active Directory contre les attaques de malw...
Sylvain Cortes
 
Comment securiser votre usage ou migration vers Office 365 [2018 12-04]
Comment securiser votre usage ou migration vers Office 365 [2018 12-04]Comment securiser votre usage ou migration vers Office 365 [2018 12-04]
Comment securiser votre usage ou migration vers Office 365 [2018 12-04]
Sylvain Cortes
 
Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...
Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...
Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...
Sylvain Cortes
 
Active directory et cyber attaques [2018 05-15]
Active directory et cyber attaques [2018 05-15]Active directory et cyber attaques [2018 05-15]
Active directory et cyber attaques [2018 05-15]
Sylvain Cortes
 
Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...
Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...
Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...
Sylvain Cortes
 

More from Sylvain Cortes (8)

Cybersécurité et Jeux d'Arcade
Cybersécurité et Jeux d'ArcadeCybersécurité et Jeux d'Arcade
Cybersécurité et Jeux d'Arcade
 
Spraykatz installation & basic usage
Spraykatz installation & basic usageSpraykatz installation & basic usage
Spraykatz installation & basic usage
 
aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...
aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...
aOS Aix/Marseille - Intégration des environnements UNIX, Linux et MacOS dans ...
 
Comment securiser votre annuaire Active Directory contre les attaques de malw...
Comment securiser votre annuaire Active Directory contre les attaques de malw...Comment securiser votre annuaire Active Directory contre les attaques de malw...
Comment securiser votre annuaire Active Directory contre les attaques de malw...
 
Comment securiser votre usage ou migration vers Office 365 [2018 12-04]
Comment securiser votre usage ou migration vers Office 365 [2018 12-04]Comment securiser votre usage ou migration vers Office 365 [2018 12-04]
Comment securiser votre usage ou migration vers Office 365 [2018 12-04]
 
Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...
Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...
Modern Worplace Conference 2018 - Usage de IoT et bigdata dans les espaces co...
 
Active directory et cyber attaques [2018 05-15]
Active directory et cyber attaques [2018 05-15]Active directory et cyber attaques [2018 05-15]
Active directory et cyber attaques [2018 05-15]
 
Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...
Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...
Révolutionnez l'usage de vos espaces collaboratifs grâce aux objets connectés...
 

Recently uploaded

GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 

Recently uploaded (20)

GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 

Enumerating Active Directory: Lateral Movement and Privilege Escalation

  • 1. © A L S I D C O P Y R I G H T 2 0 2 1 Enumerating Active Directory: Lateral Movement and Privilege Escalation Security Evangelist & Microsoft MVP
  • 2. AtTACK structure © A L S I D C O P Y R I G H T 2 0 2 1 The attackers are looking for the easiest path into the network, then they want to move laterally and gain privileges. Once obtained, they can spread ransomware, steal data, and more. 1 2 3 4 5 6 Infect endpoint with phishing or e-mail attack, and gain local admin privileges Install payload, disable local defense, start to enumerate AD and the network topology Attempt to move laterally, to other endpoints, servers, and devices Exploit known configurations to gain privileges on different servers using AD Create backdoors and persistence within AD and other network devices Collect data and/or encrypt data - Steal data for economic intelligence Attack Steps
  • 3. Enumeration tools © A L S I D C O P Y R I G H T 2 0 2 1 Bloodhound PowerView Ldapdomaindump Adidnsdump ACLight ADRecon Domains and trusts Domain SID Password Policy DCs Domain Users and attributes Domain computers Domain Groups and Members Shared folders Group Policies OUs ACLs Sessions Local Admin Rights … AdminTo MemberOf HasSession ForceChangePassword AddMembers CanRDP CanPSRemote ExecuteDCOM SQLAdmin AllowedToDelegate GetChangesAll GenericAll WriteDacl Owns … Sources: https://bloodhound.readthedocs.io/en/latest/data-analysis/nodes.html https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet#useful-enumeration-tools https://mcpmag.com/articles/2019/11/13/bloodhound-active-directory-domain-admin.aspx Tools Objects/settings Actions/privileges
  • 4. Analyzing the enumeration © A L S I D C O P Y R I G H T 2 0 2 1 Leverage Unknown Settings - Kerberos Delegations - adminSDHolder - adminCount - SYSVOL permissions Leverage Cloud Settings - AAD Connect permissions - AAD Sync - AAD SSO - Bounce to Azure AD Leverage Old Settings - Service Principal Names - Primary Group ID - SIDHistory - AD Delegations - GP Delegations
  • 5. ATTACKER strategy © A L S I D C O P Y R I G H T 2 0 2 1 Enumeration of Active Directory and all settings ▪ AD is « old » ▪ AD installation was made 10+ years ago ▪ AD is changing every day Analysis of AD to find easiest target ▪ Attackers don’t analyze the « world » with lines & columns but with graphs ▪ Remember, every user has a read access to AD Leverage actions which don’t log ▪ Security logs are not really useful ▪ Attackers can bypass the logs ▪ Attackers implement backdoors under the SIEM radar
  • 6. In a nutshell © A L S I D C O P Y R I G H T 2 0 2 1 ▪ No users with local admin rights ▪ Encrypt local disk ▪ Use LAPS (free) ▪ Implement EDR ▪ Harden your endpoint configuration ▪ Do not base your security strategy only on logs ▪ Implement Microsoft Tier- model ▪ Detect in real- time AD security deviances & Attack paths ▪ Detect in real- time AD attacks Final advice: Doubt about yourself ! Too much self- confidence is the first enemy of cybersecurity…
  • 7. © A L S I D C O P Y R I G H T 2 0 2 0 alsid.com you.