SlideShare a Scribd company logo
Submit Search
Upload
Protecting the keys to the castle! - Restricted Admin Credential Exposure
Report
Microsoft TechNet - Belgium and Luxembourg
Microsoft TechNet - Belgium and Luxembourg
Follow
•
1 like
•
1,392 views
1
of
14
Protecting the keys to the castle! - Restricted Admin Credential Exposure
•
1 like
•
1,392 views
Download Now
Download to read offline
Report
More info on http://techdays.be.
Read more
Microsoft TechNet - Belgium and Luxembourg
Microsoft TechNet - Belgium and Luxembourg
Follow
Recommended
Beginning Microservices with .NET & RabbitMQ
Paul Mooney
1.7K views
•
37 slides
Deep-dive building solutions on the SharePoint Framework
Waldek Mastykarz
1.6K views
•
12 slides
Topic 3 Double entry book keeping
Srinivas Methuku
5.3K views
•
13 slides
Point of-sale-malware-backoff
EMC
1K views
•
20 slides
Block culture of nacirema
Travis Klein
710 views
•
9 slides
Final draft script a long day by nick mc cabe
sophiemcavoy1
156 views
•
3 slides
More Related Content
Viewers also liked
Cơ bản về tủ lạnh
machupilani
3.4K views
•
10 slides
Goedgekleed
Netwerk Bewust Verbruiken
549 views
•
32 slides
My evalutauion question 1
Khendle Christie
288 views
•
4 slides
Mat lab
Rahman Hakim
1.1K views
•
174 slides
Federmanager bo convegno impermanenza_27_03_13
Marco Frullanti
270 views
•
8 slides
De stress fest2013slideshow
CheckIt Out
286 views
•
11 slides
Viewers also liked
(17)
Cơ bản về tủ lạnh
machupilani
•
3.4K views
Goedgekleed
Netwerk Bewust Verbruiken
•
549 views
My evalutauion question 1
Khendle Christie
•
288 views
Mat lab
Rahman Hakim
•
1.1K views
Federmanager bo convegno impermanenza_27_03_13
Marco Frullanti
•
270 views
De stress fest2013slideshow
CheckIt Out
•
286 views
What Is Async, How Does It Work, And When Should I Use It?
emptysquare
•
1.9K views
види таблиць конструктор
Татьяна Глинская
•
1.1K views
SME Estudio Marcas que Marcan 2012
SME Puerto Rico
•
766 views
EMC Hybrid Cloud for SAP - Enhanced Security and Compliance
EMC
•
939 views
Stalking the Kill Chain
EMC
•
1.4K views
Tues wed reformation plays
Travis Klein
•
157 views
Creative examples of origami logo design for inspiration
Maxim Logoswish
•
1.8K views
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
EMC
•
1.5K views
Pastís de xocolata rita i judit
mgonellgomez
•
259 views
Provisioning 2.0: The Future of Provisioning
EMC
•
683 views
Media Evaluation
loousmith
•
209 views
Similar to Protecting the keys to the castle! - Restricted Admin Credential Exposure
Delivering Javascript to World+Dog
Kyle Randolph
33 views
•
24 slides
The service mesh: resilient communication for microservice applications
Outlyer
708 views
•
19 slides
Exploiting Active Directory Administrator Insecurities
Priyanka Aash
246 views
•
27 slides
Case Study: Privileged Access in a World on Time
CA Technologies
1.4K views
•
23 slides
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
Felipe Prado
83 views
•
81 slides
Azure Services Platform
David Chou
6.3K views
•
23 slides
Similar to Protecting the keys to the castle! - Restricted Admin Credential Exposure
(20)
Delivering Javascript to World+Dog
Kyle Randolph
•
33 views
The service mesh: resilient communication for microservice applications
Outlyer
•
708 views
Exploiting Active Directory Administrator Insecurities
Priyanka Aash
•
246 views
Case Study: Privileged Access in a World on Time
CA Technologies
•
1.4K views
DEF CON 23 - Sean - metcalf - red vs blue ad attack and defense
Felipe Prado
•
83 views
Azure Services Platform
David Chou
•
6.3K views
Best ofmms mikeresseler
Kenny Buntinx
•
392 views
Best ofmms mikeresseler
Dieter Wijckmans
•
177 views
Escalation defenses ad guardrails every company should deploy
David Rowe
•
119 views
Topic 2 - Ransomware Techniques.pptx
Morningstar90
•
2 views
MongoDB World 2019: MongoDB Atlas Security 101 for Developers
MongoDB
•
379 views
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
•
239 views
Design patterns for microservice architecture
The Software House
•
21.9K views
RSA Secur id for windows
arpit06055
•
1.8K views
Database Security Threats - MariaDB Security Best Practices
MariaDB plc
•
421 views
QualysGuard InfoDay 2012 - Malware Detection Service – Enterprise Edition
Risk Analysis Consultants, s.r.o.
•
403 views
Understanding Azure Networking Services
InCycleSoftware
•
2.1K views
Hackers versus Developers and Secure Web Programming
Akash Mahajan
•
2K views
Sql dba training in india
united global soft
•
291 views
SQL DBA Online Training in India
united global soft
•
189 views
More from Microsoft TechNet - Belgium and Luxembourg
Windows 10: all you need to know!
Microsoft TechNet - Belgium and Luxembourg
3.1K views
•
31 slides
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Microsoft TechNet - Belgium and Luxembourg
1.7K views
•
30 slides
Windows 8.1 a closer look
Microsoft TechNet - Belgium and Luxembourg
2.8K views
•
36 slides
So you’ve successfully installed SCOM… Now what.
Microsoft TechNet - Belgium and Luxembourg
4.5K views
•
25 slides
Data Leakage Prevention
Microsoft TechNet - Belgium and Luxembourg
7.6K views
•
62 slides
Deploying and managing ConfigMgr Clients
Microsoft TechNet - Belgium and Luxembourg
4.3K views
•
40 slides
More from Microsoft TechNet - Belgium and Luxembourg
(20)
Windows 10: all you need to know!
Microsoft TechNet - Belgium and Luxembourg
•
3.1K views
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Microsoft TechNet - Belgium and Luxembourg
•
1.7K views
Windows 8.1 a closer look
Microsoft TechNet - Belgium and Luxembourg
•
2.8K views
So you’ve successfully installed SCOM… Now what.
Microsoft TechNet - Belgium and Luxembourg
•
4.5K views
Data Leakage Prevention
Microsoft TechNet - Belgium and Luxembourg
•
7.6K views
Deploying and managing ConfigMgr Clients
Microsoft TechNet - Belgium and Luxembourg
•
4.3K views
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Microsoft TechNet - Belgium and Luxembourg
•
1.2K views
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Microsoft TechNet - Belgium and Luxembourg
•
3.9K views
SCEP 2012 inside SCCM 2012
Microsoft TechNet - Belgium and Luxembourg
•
3.5K views
Jump start your application monitoring with APM
Microsoft TechNet - Belgium and Luxembourg
•
1.2K views
What’s new in Lync Server 2013: Persistent Chat
Microsoft TechNet - Belgium and Luxembourg
•
4.8K views
What's new for Lync 2013 Clients & Devices
Microsoft TechNet - Belgium and Luxembourg
•
3K views
Office 365 ProPlus: Click-to-run deployment and management
Microsoft TechNet - Belgium and Luxembourg
•
11.5K views
Office 365 Identity Management options
Microsoft TechNet - Belgium and Luxembourg
•
6.5K views
SharePoint Installation and Upgrade: Untangling Your Options
Microsoft TechNet - Belgium and Luxembourg
•
1.7K views
The application model in real life
Microsoft TechNet - Belgium and Luxembourg
•
1.9K views
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft TechNet - Belgium and Luxembourg
•
4.4K views
Managing Windows RT devices in the Enterprise
Microsoft TechNet - Belgium and Luxembourg
•
3.3K views
Moving from Device Centric to a User Centric Management
Microsoft TechNet - Belgium and Luxembourg
•
4.8K views
Network Management in System Center 2012 SP1 - VMM
Microsoft TechNet - Belgium and Luxembourg
•
2.9K views
Protecting the keys to the castle! - Restricted Admin Credential Exposure
1.
Protecting the keys
to the castle – Restricted Admin Credential Exposure Marcus Murray & Hasain Alshakarti Truesec Security Team, MVP-Enterprise Security x2
2.
Marcus Murray
Hasain Alshakarti
3.
Who doesn’t want
to be domain admin?
4.
Passing the dutchie
Web Srv Mail Srv DC File Srv Client Client Admin User
5.
Mitigating Passing the
dutchie • SMB Signing! On domain controllers!
6.
mimikatz • privilege::debug • inject::process
lsass.exe sekurlsa.dll • @getLogonPasswords • Passwords in CLEAR TEXT!!!
7.
The ”Mandiant report”
8.
Local account depencencies
Web Srv Mail Srv DC File Srv Mail Srv SrvAdm SrvAdm Client Client CliAdm CliAdm
9.
Logged on account
depencencies Web Srv Mail Srv DC File Srv Mail Srv Marcus_DA Marcus_DA Client Client Marcus_DA Marcus_DA
10.
Complete mission
Web Srv Mail Srv DC File Srv Mail Srv Client Client Admin User
11.
Microsoft PtH Mitigations
12.
Protecting! •
Local firewalls • Non-admin • Cutting dependencies • Managed service accounts • AMA
13.
Marcus Murray
Hasain Alshakarti
14.
Thank you for
listening!