SlideShare a Scribd company logo
May I see your
credentials, please?
Dana Baril
Security Software Engineer
Credential Theft Detection From Windows Credential Manager
WHY IS IT IMPORTANT
NotPetya
THE ATTACK LIFECYCLE
Intelligence
Gathering
Point Of
Entry
Command
& Control Lateral
Movement
Data
Exfiltration
Asset / Data
Delivery
• Windows Credential Manager is a central place to save login
information for websites, connected applications and networks
• Credentials can be passwords, certificates, access tokens
WINDOWS CREDENTIAL MANAGER
WINDOWSCREDENTIAL MANAGER EXAMPLES
WINDOWSCREDENTIAL MANAGER EXAMPLES
WINDOWSCREDENTIAL MANAGER EXAMPLES
WINDOWS CREDENTIAL MANAGER
Remote
Desktop
ChromeEdge
Windows
Explorer
CredMan/Vault
API
GetCredential
FindCredential
Enumerate
WINDOWS CREDENTIAL MANAGER
Lsass.exe
Remote
Desktop
ChromeEdge
Windows
Explorer
CredMan/Vault
API
CredMan/Vault
RPC server
RPC
GetCredential
FindCredential
Enumerate
WINDOWS CREDENTIAL MANAGER
Lsass.exe
Remote
Desktop
ChromeEdge
Windows
Explorer
CredMan/Vault
API
CredMan/Vault
RPC server
RPC
User
Profile
Encrypt/
Decrypt
GetCredential
FindCredential
Enumerate
WINDOWS CREDENTIAL MANAGER
Lsass.exe
Remote
Desktop
ChromeEdge
Windows
Explorer
CredMan/Vault
API
CredMan/Vault
RPC server
RPC
User
Profile
Encrypt/
Decrypt
GetCredential
FindCredential
Enumerate
Mimikatz.exe
WINDOWS
DEFENDER ATP -
EDR
POST BREACH PROTECTION
• EPP vs. EDR
Threat Intelligence
from partnerships
Threat Intelligence by
Microsoft hunters
Customers' Windows Defender ATP tenant
Windows APT Hunters,
MCS Cyber
EDR HIGH LEVEL ARCHITECTURE
Security ML analytics
Behavioral IOAs Dictionary
Files and URLs detonation
Known adversaries
unknown
Customer own
Threat IntelligenceTI
Forensic collection
Always-on endpoint
behavioral sensors
Response
Investigation
Alerts
SecOps console
Response
Threat Intelligence
from partnerships
Threat Intelligence by
Microsoft hunters
Customers' Windows Defender ATP tenant
Windows APT Hunters,
MCS Cyber
EDR HIGH LEVEL ARCHITECTURE
Security ML analytics
Behavioral IOAs Dictionary
Files and URLs detonation
Known adversaries
unknown
Customer own
Threat IntelligenceTI
Forensic collection
Always-on endpoint
behavioral sensors
Response
Investigation
Alerts
SecOps console
Response
BlueHat v18 || May i see your credentials, please
WINDOWSOS TELEMETRY
Event Logs
Lsass.exe
Remote
Desktop
ChromeEdge
Windows
Explorer
CredMan/Vault
API
CredMan/Vault
RPC server
RPC
User
Profile
Encrypt/
Decrypt
GetCredential
FindCredential
Enumerate
Mimikatz.exe
WINDOWSOS TELEMETRY
DEMO
Threat Intelligence
from partnerships
Threat Intelligence by
Microsoft hunters
Customers' Windows Defender ATP tenant
Windows APT Hunters,
MCS Cyber
HIGH LEVEL ARCHITECTURE
Security ML analytics
Behavioral IOAs Dictionary
Files and URLs detonation
Known adversaries
unknown
Customer own
Threat IntelligenceTI
Forensic collection
Always-on endpoint
behavioral sensors
Response
Investigation
Alerts
SecOps console
Response
CLOUD-BASED DETECTION
• Lots of data!
• Anomaly detection
• Apps credentials
• Web credentials
• Process signature and prevalence
• ML based abnormality
This Photo by Unknown Author is licensed under CC BY-NC-ND
SUMMARY
• Windows Credential Manager
• Credential Manager internals
• Threats on Credential Manager API
• Windows Defender ATP
• Detection:
• Windows OS telemetry
• ATP cloud-based detections engine
THANK YOU
• Alan Chan
• Mark Wodrich
• Jonathan Bar-Or
• Jasika Bawa
• Windows Defender Team
• My husband, Daniel
QUESTIONS

More Related Content

PDF
BlueHat v18 || Malicious user profiling using a deep neural net
PDF
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
PDF
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
PPTX
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
PDF
BlueHat v18 || Badly behaving scripts - meet amsi script behavior instrumenta...
PPTX
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
PDF
Hunting Lateral Movement in Windows Infrastructure
PPTX
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v17 || Where, how, and why is SSL traffic on mobile getting intercept...
BlueHat v17 || Scaling Incident Response - 5 Keys to Successful Defense at S...
BlueHat v18 || Badly behaving scripts - meet amsi script behavior instrumenta...
In The Middle of Printers - The (In)Security of Pull Printing solutions - Hac...
Hunting Lateral Movement in Windows Infrastructure
BlueHat v17 || Securing Windows Defender Application Guard

What's hot (20)

PDF
Android Application Security
PDF
Hunting for Privilege Escalation in Windows Environment
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PPTX
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
PDF
CSW2017 chuanda ding_state of windows application security
PDF
Malware collection and analysis
PDF
Web security for developers
PDF
BSides Roma 2018 - Red team techniques
PPTX
Горизонтальные перемещения в инфраструктуре Windows
PPTX
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
PDF
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
PDF
1000 to 0
PDF
Endpoint is not enough
PDF
rsa-usa-2019-keynote-paula-januszkiewicz
PPTX
BlueHat v17 || Down the Open Source Software Rabbit Hole
PPTX
Kheirkhabarov24052017_phdays7
PDF
Anatomy of a Cloud Hack
PPTX
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
PPT
Writing Secure Code – Threat Defense
PPTX
Rapid Android Application Security Testing
Android Application Security
Hunting for Privilege Escalation in Windows Environment
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
CSW2017 chuanda ding_state of windows application security
Malware collection and analysis
Web security for developers
BSides Roma 2018 - Red team techniques
Горизонтальные перемещения в инфраструктуре Windows
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
BlueHat v18 || Protecting the protector, hardening machine learning defenses ...
1000 to 0
Endpoint is not enough
rsa-usa-2019-keynote-paula-januszkiewicz
BlueHat v17 || Down the Open Source Software Rabbit Hole
Kheirkhabarov24052017_phdays7
Anatomy of a Cloud Hack
DFIR Austin Training (Feb 2020): Remote Access & Deploying Agents
Writing Secure Code – Threat Defense
Rapid Android Application Security Testing
Ad

Similar to BlueHat v18 || May i see your credentials, please (20)

PPTX
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
PDF
Case Study: Privileged Access in a World on Time
PPTX
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
PDF
CyberArk Cleveland Defend Non-Human ID Exploitations
PDF
Identity-Based Security and Privacy for the Internet of Things
PDF
Web application security (eng)
PPTX
It's a Dangerous World
PDF
Which Came First: The Phish or the Opportunity to Defend Against It
PDF
rsa_usa_2019_paula_januszkiewicz
PDF
Gartner Security & Risk Management Summit 2018
PDF
The Infosec Revival
PPTX
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
PDF
Pentesting RESTful webservices
PDF
Open Source Identity Management
PDF
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
PPTX
Lets Encrypt!
PDF
MITRE ATT&CK Framework
PDF
Introduction to MITRE ATT&CK
PPTX
ASP.NET Single Sign On
PDF
Identity theft: Developers are key - JFokus 2017
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
Case Study: Privileged Access in a World on Time
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
CyberArk Cleveland Defend Non-Human ID Exploitations
Identity-Based Security and Privacy for the Internet of Things
Web application security (eng)
It's a Dangerous World
Which Came First: The Phish or the Opportunity to Defend Against It
rsa_usa_2019_paula_januszkiewicz
Gartner Security & Risk Management Summit 2018
The Infosec Revival
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Pentesting RESTful webservices
Open Source Identity Management
SANS Threat Hunting Summit 2018 - Hunting Lateral Movement with Windows Event...
Lets Encrypt!
MITRE ATT&CK Framework
Introduction to MITRE ATT&CK
ASP.NET Single Sign On
Identity theft: Developers are key - JFokus 2017
Ad

More from BlueHat Security Conference (20)

PDF
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
PDF
BlueHat Seattle 2019 || Keynote
PDF
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
PDF
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
PDF
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
PDF
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
PDF
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
PDF
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
PDF
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
PDF
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
PDF
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
PDF
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
PDF
BlueHat v18 || First strontium uefi rootkit unveiled
PDF
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
PDF
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
PDF
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
PDF
BlueHat v18 || Memory resident implants - code injection is alive and well
PDF
BlueHat v18 || Massive scale usb device driver fuzz without device
PDF
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
PDF
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || The matrix has you - protecting linux using deception

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...

BlueHat v18 || May i see your credentials, please