SlideShare a Scribd company logo
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Tier 2
Workstation &
Device Admins
Tier 0
Domain &
Enterprise Admins
Tier 1
Server Admins
1. Beachhead	(Phishing	Attack,	etc.)
2. Lateral	Movement
a. Steal	Credentials
b. Compromise	more	hosts	&	credentials
3. Privilege	Escalation
a. Compromise	unpatched	servers
b. Get	Domain	Admin	credentials
4. Execute	Attacker	Mission
a. Steal	data,	destroy	systems,	etc.
b. Persist	Presence
24-48	Hours
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
John	Lambert,	Microsoft
https://blogs.technet.microsoft.com/johnla/2015/04/26/defenders-think-in-lists-attackers-think-in-
graphs-as-long-as-this-is-true-attackers-win/
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
TRADITIONAL	PLATFORM	STACK
JUST	ONE	VULNERABILITY	AWAY	FROM	FULL	COMPROMISE	
Device	Hardware
Kernel
Windows	Platform	Services
Apps
Kernel
Windows	Platform	Services
Apps
Kernel
Windows	Defender	System	Guard
Trustlet#1
Trustlet#2
Trustlet#3
Hypervisor
Device	Hardware
Windows	Operating	System
Hyper-VHyper-V
WINDOWS	DEFENDER	SYSTEM	GUARD	CONTAINER	
POWERED	BY	VIRTUALIZATION	BASED	SECURITY
HARDWARE	ISOLATION	OF	MICROSOFT	EDGE	WITH	
WINDOWS	DEFENDER	APPLICATION	GUARD	
Hypervisor
Device	Hardware
Kernel
Windows	Platform	Services
Apps
Kernel
Windows	Platform	
Services
Microsoft	Edge
Kernel
Windows	Defender	System	Guard
Critical	System	Processes
Operating	SystemWindows	Defender	Application	Guard
1.	
Single	IT	Pro’s	machine	is		
compromised
IT	Pro	manages	
kiosks/shared	devices	on	
network
Attacker	steals	IT	Pro’s	
access	token
2.	
Using	IT	Pros	access	token	
attacker	looks	for	
kiosk/shared	devices	and	
mines	them	for	tokens
3.	
Repeat
TODAY’S	SECURITY	CHALLENGE:
PASS	THE	HASH	ATTACKS
1. How	Pass-the-Hash	works	
PDF
2. Mitigating	Pass-the-Hash	and	
Other	Credential	Theft	v1
3. Mitigating	Pass-the-Hash	and	
Other	Credential	Theft	v2
https://aka.ms/pth
TODAY’S	SOLUTION: CREDENTIAL	GUARD
à Pass	the	Hash	(PtH)	attacks	are	the	
#1	go-to	tool	for	hackers.	Used	in	
nearly	every	major	breach	and	APT	
type	of	attack
à Credential	Guard	uses	VBS	to	isolate	
Windows	authentication	from	
Windows	operating	system
à Protects	LSA	Service	(LSASS)	and	
derived	credentials	(NTLM	Hash)	
à Fundamentally	breaks	derived	
credential	theft	using	MimiKatz,	
Kernel
Windows	Platform	Services
Apps
Kernel
Windows	Defender	System	Guard
Credential	Guard
Trustlet#2
Trustlet#3
Hypervisor
Device	Hardware
Windows	Operating	System
Hyper-VHyper-V
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Unique	Local	Admin	
Passwords	
for	Workstations
http://aka.ms/LAPS
http://aka.ms/ata
http://aka.ms/ata
http://aka.ms/ata
http://aka.ms/ata
http://aka.ms/ata
CODE
TODAY’S	CHALLENGE:
OUR	ANSWER:	CODE MUST EARN TRUST BEFORE USE
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
http://aka.ms/CyberPAW
http://aka.ms/CyberPAW
https://blogs.technet.microsoft.com/secg
uide
http://aka.ms/HardenAD
https://docs.microsoft.com/en-
us/windows/device-
security/security-compliance-
toolkit-10
DSC	Environment	Analyzer	
(DSCEA)	
https://www.powershellgallery.com/package
s/DSCEA/
Shielded	VMs	for	virtual	DCs	
(Server	2016	Hyper-V	Fabric)
http://aka.ms/shieldedvms
http://aka.ms/JEA
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
http://aka.ms/PAM
http://aka.ms/ESAE
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Artyom	Sinitsyn
Security	Program	Manager	for	CEE	&	CIS
Microsoft	CSS	Security
artsin@microsoft.com
@ArtyomSinitsyn
Microsoft	Security Russia	blog
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак
Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак

More Related Content

PDF
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
PDF
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
PPTX
Windows 7 professional Vs Windows 7 enterprise
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPS
Workshop on BackTrack live CD
PPTX
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
PDF
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
PPTX
Windows 7 Security Enhancements
Android Things Security Research in Developer Preview 2 (FFRI Monthly Researc...
An Overview of the Android Things Security (FFRI Monthly Research Jan 2017)
Windows 7 professional Vs Windows 7 enterprise
Kunal - Introduction to backtrack - ClubHack2008
Workshop on BackTrack live CD
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows 7 Security Enhancements

What's hot (20)

PPTX
DerbyCon 2017 - Behind Enemy Lines
PPT
Bigger On The Inside
PDF
A Stuxnet for Mainframes
ODP
Qualys Threads
PPTX
Stuxnet mass weopan of cyber attack
PDF
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
PDF
Gang gong, escalate privilege by vulnerabilities in android system services
PPT
I Heart Stuxnet
PPTX
Kali linux and hacking
PPT
Rootkit
PPT
Stuxnet - Case Study
DOCX
Security features of fedora
PDF
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
PPTX
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
PDF
PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
PDF
Mission Critical Security in a Post-Stuxnet World Part 1
PDF
Research Paper on Rootkit.
PPTX
News Bytes - May 2015
PDF
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
DerbyCon 2017 - Behind Enemy Lines
Bigger On The Inside
A Stuxnet for Mainframes
Qualys Threads
Stuxnet mass weopan of cyber attack
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
Gang gong, escalate privilege by vulnerabilities in android system services
I Heart Stuxnet
Kali linux and hacking
Rootkit
Stuxnet - Case Study
Security features of fedora
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Threat Analysis on Win10 IoT Core and Recommaended Security Measures by Naohi...
Ch 9: Embedded Operating Systems: The Hidden Threat
Mission Critical Security in a Post-Stuxnet World Part 1
Research Paper on Rootkit.
News Bytes - May 2015
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
Ad

Similar to Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак (20)

PDF
Is Troy Burning: an overview of targeted trojan attacks
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PPTX
Presentation for information security & hacking
PDF
Virtualization security and threat
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PPTX
Analysis on NIMDA Worm in Windows | Exploitation | Detection | Propagation
PDF
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
PDF
PDF
case study1 web defacement answer.pdf
PPT
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
PDF
Bcd Securing Active Directory v1 3
PPTX
CEHv10 M0 Introduction.pptx
PPS
Network Vulnerability Assessments: Lessons Learned
PPS
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
PPT
Protecting Your organization from WannaCry Ransomware
PDF
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
PPTX
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
PPT
BSides Philly Finding a Company's BreakPoint
PDF
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
Is Troy Burning: an overview of targeted trojan attacks
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
Presentation for information security & hacking
Virtualization security and threat
Kunal - Introduction to BackTrack - ClubHack2008
Analysis on NIMDA Worm in Windows | Exploitation | Detection | Propagation
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
case study1 web defacement answer.pdf
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bcd Securing Active Directory v1 3
CEHv10 M0 Introduction.pptx
Network Vulnerability Assessments: Lessons Learned
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Protecting Your organization from WannaCry Ransomware
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
Webinar Fondazione CRUI - Microsoft: La Cyber Security nelle Università
BSides Philly Finding a Company's BreakPoint
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
Ad

More from KazHackStan (20)

PPTX
Андрей Масалович (Россия). Корпоративная защита в РК глазами хакера
PDF
Евгений Гончаров (Россия, Казахстан). Автоматизация рутины AD
PPTX
Иван Чалыкин (Россия), Digital Security. Легальный SOP Bypass. Проблемы внедр...
PPTX
Тимур Юнусов (Россия), Positive Technologies. Уязвимости банкоматов
PPTX
Антон Bo0oM Лопаницын (Россия), OnSec. Трекинг. Как узнать посетителя, если о...
PDF
Омар Ганиев (Россия). Обзор атак на модели машинного обучения
PPTX
Валерий Блонский (Казахстан), PACIFICA. Как угнать Ботнет
PPTX
Татьяна Новикова (Казахстан), ЦАРКА. Как мы мониторим Казнет с помощью WebTotem
PPTX
Шамбулов У. К. (Казахстан), ГТС. Анализ и исследование инцидентов информацион...
PPTX
Ярослав Бабин (Россия), Positive Technologies. Основные аспекты при проведени...
PPTX
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
PDF
Валерий Боронин (Россия), Positive Technologies. SSDL для руководителей: как ...
PDF
Батыржан Тютеев (Казахстан), ЦАРКА. Уязвимости Казнета
PDF
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
PDF
Максим Ефименко (Казахстан), ЦАРКА. Двойное проникновение
PDF
Сергей Харюк (Украина). Проверка безопасности приложений на платформе iOS
PDF
Андрей Абакумов (Россия). Yandex.ru. Соавтор: Эльдар Заитов. Автоматизация ск...
PDF
Ярослав Бабин (Россия), Positive Technologies. Основные аспекты при проведени...
PDF
Ильяс Аринов (Казахстан), ЦАРКА. Linux for newbie hackers
PPTX
Презентация НИТ
Андрей Масалович (Россия). Корпоративная защита в РК глазами хакера
Евгений Гончаров (Россия, Казахстан). Автоматизация рутины AD
Иван Чалыкин (Россия), Digital Security. Легальный SOP Bypass. Проблемы внедр...
Тимур Юнусов (Россия), Positive Technologies. Уязвимости банкоматов
Антон Bo0oM Лопаницын (Россия), OnSec. Трекинг. Как узнать посетителя, если о...
Омар Ганиев (Россия). Обзор атак на модели машинного обучения
Валерий Блонский (Казахстан), PACIFICA. Как угнать Ботнет
Татьяна Новикова (Казахстан), ЦАРКА. Как мы мониторим Казнет с помощью WebTotem
Шамбулов У. К. (Казахстан), ГТС. Анализ и исследование инцидентов информацион...
Ярослав Бабин (Россия), Positive Technologies. Основные аспекты при проведени...
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
Валерий Боронин (Россия), Positive Technologies. SSDL для руководителей: как ...
Батыржан Тютеев (Казахстан), ЦАРКА. Уязвимости Казнета
Сергей Белов (Россия), Mail.ru. Temple of Bug Bounty: Leveling & Farming
Максим Ефименко (Казахстан), ЦАРКА. Двойное проникновение
Сергей Харюк (Украина). Проверка безопасности приложений на платформе iOS
Андрей Абакумов (Россия). Yandex.ru. Соавтор: Эльдар Заитов. Автоматизация ск...
Ярослав Бабин (Россия), Positive Technologies. Основные аспекты при проведени...
Ильяс Аринов (Казахстан), ЦАРКА. Linux for newbie hackers
Презентация НИТ

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Touch Screen Technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
1. Introduction to Computer Programming.pptx
PDF
August Patch Tuesday
PDF
Mushroom cultivation and it's methods.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
project resource management chapter-09.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting Started with Data Integration: FME Form 101
A Presentation on Touch Screen Technology
Assigned Numbers - 2025 - Bluetooth® Document
NewMind AI Weekly Chronicles - August'25-Week II
Univ-Connecticut-ChatGPT-Presentaion.pdf
Programs and apps: productivity, graphics, security and other tools
A novel scalable deep ensemble learning framework for big data classification...
Encapsulation_ Review paper, used for researhc scholars
Heart disease approach using modified random forest and particle swarm optimi...
1. Introduction to Computer Programming.pptx
August Patch Tuesday
Mushroom cultivation and it's methods.pdf
TLE Review Electricity (Electricity).pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
DP Operators-handbook-extract for the Mautical Institute
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
project resource management chapter-09.pdf
Approach and Philosophy of On baking technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Артём Синицын, Microsoft. Падение Олимпа: как защитить ваш домен Active Directory от современных векторов атак