SlideShare a Scribd company logo
1
Advanced targeted attacks
Protecting Against
with IAM Best Practices
2
▪ Strategic Advisor – CyberArk Software
▪ B.S. Information Systems – University of Texas at Arlington
▪ COMPTIA A+ & Sec+
▪ VMWare VCA-DCV
▪ (ISC)2 SSCP & CISSP
▪ GIAC GPEN (Taking exam tomorrow!)
▪ Married, Father of 2 girls.
▪ Member of Shadow Systems Hacker Collective
▪ Member of Dallas Hackers Association
Hello Friend - Andy Thompson
@R41nM4kr
3
▪ Golden Ticket PoC
▪ Defense using IAM Best Practices
▪ Q&A
▪ Mass Applause
Agenda
4
Golden Ticket Attack
Golden Ticket Attack
Proof of Concept in Under 6 Minutes.
(4 Minutes if I weren’t so bad at typing)
5
▪ It didn’t actually go
down like this.
▪ More than one way to
skin a cat.
▪ No 1337 H4X here.
Just a warning here. . . …
6
So simple, you don’t have to be a 400lb hacker
living in your parents’ basement to do it!
7
What is a Golden Ticket Attack
8
9
10
The Bangladesh Bank Heist
11
FOUNDATIONFUNDANTION
12
What makes an attack advanced?
An advanced attack is…
a targeted attack against a specific organization, during
which an attacker operates extensively inside the network
Contrary to:
Distributed Denial of
Service (DDoS)
Opportunistic endpoint
attacks (ex. Ransomware)
Quick, targeted attacks
(ex: Support Call
Scams)
13
Phases of an Advanced Attack
External
Recon
•OSINT
•Passive Scanning
Breach
•Phishing
•USB Drops
•Exploits
Internal
Recon
•Network Queries
•Passive Listening
•Probing
Lateral
Movement
•Seek Creds
•See Access
Domain
Compromise
•Golden Ticket
•Persistence
Endgame
•Exfiltration
•DoS
•Corrupt
14
Breach
Email with malicious attachment
15
16
Domain Controller
File Server 1
Admin Workstation
Web Server 3
Help Desk
Workstation
Internal Recon
WHAT computers are there in the network?
WHO are the privileged users?
WHERE are they connected?
What privileges can I GET?
nmap bloodhound
COMMON TOOLS USED FOR RECON
Powershell
17
18
Domain Controller
Web Server 3
Help Desk
Workstation
Lateral Movement
Connect to the shared machine
Search for credentials
Steal privileged credentials
File Server 1
Admin Workstation
mimikatz
COMMON TOOLS USED FOR LATERAL MOVEMENT
*****
Domain Admin
credentials found!
PsExec
19
20
Domain Compromise
Connect to Domain Controller
Steal krbtgt hash
Create a Golden Ticket with required privileges
Locate and access desired system: SWIFTNet Domain Controller
NEXT: Steal the krbtgt hash
Generate golden
ticket for full
domain access
!
SWIFTNet
21
22
Recipient Bank
SWIFTNet
SWIFT User 1
SWIFT User 2
Actions on target
!
SWIFTNet Server
Access the SWIFT server
Locate pending transaction file
Inject fraudulent transaction
23
25
Profit!
26
IAM
Best Practices
27
▪ Remove Unnecessary Privileges
■ Local Admin
■ Implement Least Privilege
▪ Manage Application Access
■ Block applications running by
unauthorized accounts
■ Allow others.
Endpoint Least Privilege
28
▪ Not really IAM, but still a Best
Practice recommendation.
■ Prevents lateral movement.
▪ Route Privileged Identities
through isolated jump servers.
■ Can’t pass the hash if you
can’t get a hash!
■ Accountability & Auditing
• Privileged Internal Users
• Vendors & 3rd Parties too!
Network Segmentation
29
Routers and
SwitchesVault
Windows/UNIX
Servers
Web Sites
1. Logon through PVWA
2. Connect
3. Fetch credential from Vault
4. Connect using native protocols
5. Store session recording
6. Logs forwarded to SIEM/Syslog
4
5
Databases
6
SIEM/Syslog
ESXvCenters
1
HTTPS
2
RDP over HTTPS
PSM
3
Privileged Session Management Explained.
30
▪ Secure and Manage your
Credentials
■ Unique
■ Complex
■ Ever-changing!
▪ Require MFA
▪ Credential Boundaries
■ See MSFT Whitepaper:
Mitigating Pass the Hash Attacks
and Other Credential Theft
Version 2
Credentials
31
Tier 0
Tier 1
Tier 2
Tier 0 – Forest Admins: Direct of indirect administrative control
of Active Directory forests, domains, or domain controllers.
Tier 1 – Server Admins: Direct or indirect administrative control
over a single or multiple servers.
Tier 2 – Workstation Admins: Direct or indirect administrative
control over a single or multiple devices.
32
Identity
Flesh & Blood Individual
Account
Defined Permissions
Key concept here…(Write this down!)
34
35
AThompson
JVealey
NLiran
KJermyn
PLi
ADM-AThompson
ADM-JVealey
ADM-NLiran
ADM-KJermyn
ADM-PLI
5 Privileged Accounts
ADM-Functional-Account
1 Privileged Account
AThompson
JVealey
NLiran
KJermyn
PLi
36
The whole-shabang!
Unbounded Network
Financial Databases PCI Databases
ESX Servers
Domain Controllers
Workstations/Laptops
Network w/Credential Boundaries
Financial Databases PCI Databases
ESX Servers
Domain Controllers
Workstations/Laptops
Further Reduce Risk of Theft
With EPM
37
 Monitor privileged users
 Internal employees & 3rd Party Access
 Alerting on high risk or malicious
events
 DCSync
 IOC behavior.
 Alert on behavior anomalies
 Logons outside your IAM controls.
Monitoring
38
Endpoint Network Credentials Monitoring
 Remove local
privileges
 Control applications
 Segment off
sensitive assets
 Route access
through jump servers
 Enforce credential
tiers
 Require multi-factor
authentication
 Secure and manage
privileged credentials
 Set alerts on
malicious events
 Monitor behavior to
detect anomalies
 Monitor privileged
users
Iam Best Practices . . . In review.
39
Thank
You!
40
▪ Email:
Andy.Thompson@CyberArk.com
▪ Website:
CyberArk.com
▪ Twitter:
R41nM4kr
▪ LinkedIn:
AndyThompsonInfoSec
Andy Thompson

More Related Content

What's hot

Insider threat
Insider threatInsider threat
Insider threat
ARCON TECHSOLUTIONS
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
TicTac Data Recovery
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
Eric Schiowitz
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
illustro
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
Matt Lemon
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
ObserveIT
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
PECB
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
April Mardock CISSP
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
Ulf Mattsson
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
Tal Be'ery
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
David Mai, MBA
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
David Mai, MBA
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
ObserveIT
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
CBIZ, Inc.
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoMatt Frowert
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 

What's hot (20)

Insider threat
Insider threatInsider threat
Insider threat
 
Recover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by TictacRecover your files from Ransomware - Ransomware Incident Response by Tictac
Recover your files from Ransomware - Ransomware Incident Response by Tictac
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Ht t17
Ht t17Ht t17
Ht t17
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Dealing with the insider threat.
Dealing with the insider threat.Dealing with the insider threat.
Dealing with the insider threat.
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Target Breach Analysis
Target Breach AnalysisTarget Breach Analysis
Target Breach Analysis
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Insider Threats Webinar Final_Tyco
Insider Threats Webinar Final_TycoInsider Threats Webinar Final_Tyco
Insider Threats Webinar Final_Tyco
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 

Viewers also liked

Ankur ppt demand
Ankur ppt demandAnkur ppt demand
Ankur ppt demand
ANKUR KUMAR
 
Capítulo iii
Capítulo iiiCapítulo iii
Capítulo iii
Comunidad Juridica
 
Origen del internet
Origen del internetOrigen del internet
Origen del internet
diana hernandes
 
Beyond land sparing and sharing: a social-ecological approach to integrate fo...
Beyond land sparing and sharing: a social-ecological approach to integrate fo...Beyond land sparing and sharing: a social-ecological approach to integrate fo...
Beyond land sparing and sharing: a social-ecological approach to integrate fo...
JSchultner
 
我想讀財管系嗎?
我想讀財管系嗎?我想讀財管系嗎?
我想讀財管系嗎?
Youren
 
Clasisificasion de empresas
Clasisificasion de empresasClasisificasion de empresas
Clasisificasion de empresas
Dana Karen Zanches
 
Ffvp webinar 2017
Ffvp webinar 2017Ffvp webinar 2017
Ffvp webinar 2017
Nevada Agriculture
 
If You Fund It, They Will Come
If You Fund It, They Will ComeIf You Fund It, They Will Come
If You Fund It, They Will Come
Laura Francabandera
 
Aula II - Criação de sites I
Aula II - Criação de sites IAula II - Criação de sites I
Aula II - Criação de sites I
info_cimol
 
Web 2.0 - Clara
Web 2.0 - ClaraWeb 2.0 - Clara
Web 2.0 - Clara
0csmith
 
409031 grey road 4
409031 grey road 4409031 grey road 4
409031 grey road 4
Robert Porteous
 
Acute Coronary Syndrome
Acute Coronary SyndromeAcute Coronary Syndrome
Acute Coronary Syndrome
Quang Huy Phạm
 
Xamarin Fest Santo Domingo ( introduccion)
Xamarin  Fest Santo Domingo ( introduccion)Xamarin  Fest Santo Domingo ( introduccion)
Xamarin Fest Santo Domingo ( introduccion)
Yhorby Matias
 
Trasmision criterios de localizacion
Trasmision criterios de localizacionTrasmision criterios de localizacion
Trasmision criterios de localizacion
norenelson
 
Avideep singh
Avideep singhAvideep singh
Avideep singh
avideep666
 
1. Το πρόβλημα του κακού στον σημερινό κόσμο
1. Το πρόβλημα του κακού στον σημερινό κόσμο1. Το πρόβλημα του κακού στον σημερινό κόσμο
1. Το πρόβλημα του κακού στον σημερινό κόσμο
Papanikolaou Dimitris
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
Andy Thompson
 
Historical developments
Historical developmentsHistorical developments
Historical developments
Charlotte Revell
 
Produccion y desarollo sustentable
Produccion y desarollo sustentableProduccion y desarollo sustentable
Produccion y desarollo sustentable
Angeles Lopez Jimenez
 
Seminario 2 tics
Seminario 2 ticsSeminario 2 tics
Seminario 2 tics
Victor Cubero sanchez
 

Viewers also liked (20)

Ankur ppt demand
Ankur ppt demandAnkur ppt demand
Ankur ppt demand
 
Capítulo iii
Capítulo iiiCapítulo iii
Capítulo iii
 
Origen del internet
Origen del internetOrigen del internet
Origen del internet
 
Beyond land sparing and sharing: a social-ecological approach to integrate fo...
Beyond land sparing and sharing: a social-ecological approach to integrate fo...Beyond land sparing and sharing: a social-ecological approach to integrate fo...
Beyond land sparing and sharing: a social-ecological approach to integrate fo...
 
我想讀財管系嗎?
我想讀財管系嗎?我想讀財管系嗎?
我想讀財管系嗎?
 
Clasisificasion de empresas
Clasisificasion de empresasClasisificasion de empresas
Clasisificasion de empresas
 
Ffvp webinar 2017
Ffvp webinar 2017Ffvp webinar 2017
Ffvp webinar 2017
 
If You Fund It, They Will Come
If You Fund It, They Will ComeIf You Fund It, They Will Come
If You Fund It, They Will Come
 
Aula II - Criação de sites I
Aula II - Criação de sites IAula II - Criação de sites I
Aula II - Criação de sites I
 
Web 2.0 - Clara
Web 2.0 - ClaraWeb 2.0 - Clara
Web 2.0 - Clara
 
409031 grey road 4
409031 grey road 4409031 grey road 4
409031 grey road 4
 
Acute Coronary Syndrome
Acute Coronary SyndromeAcute Coronary Syndrome
Acute Coronary Syndrome
 
Xamarin Fest Santo Domingo ( introduccion)
Xamarin  Fest Santo Domingo ( introduccion)Xamarin  Fest Santo Domingo ( introduccion)
Xamarin Fest Santo Domingo ( introduccion)
 
Trasmision criterios de localizacion
Trasmision criterios de localizacionTrasmision criterios de localizacion
Trasmision criterios de localizacion
 
Avideep singh
Avideep singhAvideep singh
Avideep singh
 
1. Το πρόβλημα του κακού στον σημερινό κόσμο
1. Το πρόβλημα του κακού στον σημερινό κόσμο1. Το πρόβλημα του κακού στον σημερινό κόσμο
1. Το πρόβλημα του κακού στον σημερινό κόσμο
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Historical developments
Historical developmentsHistorical developments
Historical developments
 
Produccion y desarollo sustentable
Produccion y desarollo sustentableProduccion y desarollo sustentable
Produccion y desarollo sustentable
 
Seminario 2 tics
Seminario 2 ticsSeminario 2 tics
Seminario 2 tics
 

Similar to Preventing Advanced Targeted Attacks with IAM Best Practices

MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
MSP360
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
vngundi
 
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
Mauricio Velazco
 
Exploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator InsecuritiesExploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator Insecurities
Priyanka Aash
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
Sunny Neo
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
Guardicore
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
Will Schroeder
 
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defenseDEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
Felipe Prado
 
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitchesDEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
Felipe Prado
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
MariaDB plc
 
Not a Security Boundary
Not a Security BoundaryNot a Security Boundary
Not a Security Boundary
Will Schroeder
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
Paula Januszkiewicz
 
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat Security Conference
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill Chain
Erik Van Buggenhout
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
Debra Baker, CISSP CSSP
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
Jesse Burke
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
Slawomir Jasek
 
Credential provider
Credential providerCredential provider

Similar to Preventing Advanced Targeted Attacks with IAM Best Practices (20)

MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
 
Exploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator InsecuritiesExploiting Active Directory Administrator Insecurities
Exploiting Active Directory Administrator Insecurities
 
Attacker's Perspective of Active Directory
Attacker's Perspective of Active DirectoryAttacker's Perspective of Active Directory
Attacker's Perspective of Active Directory
 
Conclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at ScaleConclusions from Tracking Server Attacks at Scale
Conclusions from Tracking Server Attacks at Scale
 
Derbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active Directory
 
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defenseDEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
 
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitchesDEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Not a Security Boundary
Not a Security BoundaryNot a Security Boundary
Not a Security Boundary
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
 
SEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill ChainSEC599 - Breaking The Kill Chain
SEC599 - Breaking The Kill Chain
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7Jesse Burke RDPwned HackMiami7
Jesse Burke RDPwned HackMiami7
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
Credential provider
Credential providerCredential provider
Credential provider
 

Recently uploaded

学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 

Recently uploaded (20)

学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 

Preventing Advanced Targeted Attacks with IAM Best Practices

  • 1. 1 Advanced targeted attacks Protecting Against with IAM Best Practices
  • 2. 2 ▪ Strategic Advisor – CyberArk Software ▪ B.S. Information Systems – University of Texas at Arlington ▪ COMPTIA A+ & Sec+ ▪ VMWare VCA-DCV ▪ (ISC)2 SSCP & CISSP ▪ GIAC GPEN (Taking exam tomorrow!) ▪ Married, Father of 2 girls. ▪ Member of Shadow Systems Hacker Collective ▪ Member of Dallas Hackers Association Hello Friend - Andy Thompson @R41nM4kr
  • 3. 3 ▪ Golden Ticket PoC ▪ Defense using IAM Best Practices ▪ Q&A ▪ Mass Applause Agenda
  • 4. 4 Golden Ticket Attack Golden Ticket Attack Proof of Concept in Under 6 Minutes. (4 Minutes if I weren’t so bad at typing)
  • 5. 5 ▪ It didn’t actually go down like this. ▪ More than one way to skin a cat. ▪ No 1337 H4X here. Just a warning here. . . …
  • 6. 6 So simple, you don’t have to be a 400lb hacker living in your parents’ basement to do it!
  • 7. 7 What is a Golden Ticket Attack
  • 8. 8
  • 9. 9
  • 12. 12 What makes an attack advanced? An advanced attack is… a targeted attack against a specific organization, during which an attacker operates extensively inside the network Contrary to: Distributed Denial of Service (DDoS) Opportunistic endpoint attacks (ex. Ransomware) Quick, targeted attacks (ex: Support Call Scams)
  • 13. 13 Phases of an Advanced Attack External Recon •OSINT •Passive Scanning Breach •Phishing •USB Drops •Exploits Internal Recon •Network Queries •Passive Listening •Probing Lateral Movement •Seek Creds •See Access Domain Compromise •Golden Ticket •Persistence Endgame •Exfiltration •DoS •Corrupt
  • 15. 15
  • 16. 16 Domain Controller File Server 1 Admin Workstation Web Server 3 Help Desk Workstation Internal Recon WHAT computers are there in the network? WHO are the privileged users? WHERE are they connected? What privileges can I GET? nmap bloodhound COMMON TOOLS USED FOR RECON Powershell
  • 17. 17
  • 18. 18 Domain Controller Web Server 3 Help Desk Workstation Lateral Movement Connect to the shared machine Search for credentials Steal privileged credentials File Server 1 Admin Workstation mimikatz COMMON TOOLS USED FOR LATERAL MOVEMENT ***** Domain Admin credentials found! PsExec
  • 19. 19
  • 20. 20 Domain Compromise Connect to Domain Controller Steal krbtgt hash Create a Golden Ticket with required privileges Locate and access desired system: SWIFTNet Domain Controller NEXT: Steal the krbtgt hash Generate golden ticket for full domain access ! SWIFTNet
  • 21. 21
  • 22. 22 Recipient Bank SWIFTNet SWIFT User 1 SWIFT User 2 Actions on target ! SWIFTNet Server Access the SWIFT server Locate pending transaction file Inject fraudulent transaction
  • 23. 23
  • 26. 27 ▪ Remove Unnecessary Privileges ■ Local Admin ■ Implement Least Privilege ▪ Manage Application Access ■ Block applications running by unauthorized accounts ■ Allow others. Endpoint Least Privilege
  • 27. 28 ▪ Not really IAM, but still a Best Practice recommendation. ■ Prevents lateral movement. ▪ Route Privileged Identities through isolated jump servers. ■ Can’t pass the hash if you can’t get a hash! ■ Accountability & Auditing • Privileged Internal Users • Vendors & 3rd Parties too! Network Segmentation
  • 28. 29 Routers and SwitchesVault Windows/UNIX Servers Web Sites 1. Logon through PVWA 2. Connect 3. Fetch credential from Vault 4. Connect using native protocols 5. Store session recording 6. Logs forwarded to SIEM/Syslog 4 5 Databases 6 SIEM/Syslog ESXvCenters 1 HTTPS 2 RDP over HTTPS PSM 3 Privileged Session Management Explained.
  • 29. 30 ▪ Secure and Manage your Credentials ■ Unique ■ Complex ■ Ever-changing! ▪ Require MFA ▪ Credential Boundaries ■ See MSFT Whitepaper: Mitigating Pass the Hash Attacks and Other Credential Theft Version 2 Credentials
  • 30. 31 Tier 0 Tier 1 Tier 2 Tier 0 – Forest Admins: Direct of indirect administrative control of Active Directory forests, domains, or domain controllers. Tier 1 – Server Admins: Direct or indirect administrative control over a single or multiple servers. Tier 2 – Workstation Admins: Direct or indirect administrative control over a single or multiple devices.
  • 31. 32 Identity Flesh & Blood Individual Account Defined Permissions Key concept here…(Write this down!)
  • 32. 34
  • 34. 36 The whole-shabang! Unbounded Network Financial Databases PCI Databases ESX Servers Domain Controllers Workstations/Laptops Network w/Credential Boundaries Financial Databases PCI Databases ESX Servers Domain Controllers Workstations/Laptops Further Reduce Risk of Theft With EPM
  • 35. 37  Monitor privileged users  Internal employees & 3rd Party Access  Alerting on high risk or malicious events  DCSync  IOC behavior.  Alert on behavior anomalies  Logons outside your IAM controls. Monitoring
  • 36. 38 Endpoint Network Credentials Monitoring  Remove local privileges  Control applications  Segment off sensitive assets  Route access through jump servers  Enforce credential tiers  Require multi-factor authentication  Secure and manage privileged credentials  Set alerts on malicious events  Monitor behavior to detect anomalies  Monitor privileged users Iam Best Practices . . . In review.
  • 38. 40 ▪ Email: Andy.Thompson@CyberArk.com ▪ Website: CyberArk.com ▪ Twitter: R41nM4kr ▪ LinkedIn: AndyThompsonInfoSec Andy Thompson