SlideShare a Scribd company logo
The Enemy Within: Stopping Advanced Attacks
Against Local Users
Tal Be’ery, Sr. Security Research Manager, Microsoft ATA, @TalBeerySec
Marina Simakov, Security Researcher, Microsoft ATA
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
Intro
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
“When the Cyber Kill-
Chain Met Local Users”
Group:
IT
Admins
User:
Bob
Computer:
Server1
User:
Mary
Group:
Domain
Admins
http://www.slideshare.net/AndyRobbins3/six-degrees-of-
domain-admin-bloodhound-at-def-con-24
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
https://www.safety.com/wp-content/uploads/2012/12/Burglar-Entry-300x300.jpg
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
Admin Recon
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
Defending
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
http://s1206.photobucket.com/user/harbottle1/media/Posters%202/LocalHeroQuad.jpg.html
Parting Thoughts
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
Win version Who can query SAMR by default Can default be changed
< Win10 Any domain user No
Win10 Any domain user Yes (only via registry)
> Win10 (e.g.
anniversary)
Only local administrators Yes (registry or GPO)
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users
The Enemy Within: Stopping Advanced Attacks Against Local Users

More Related Content

PDF
The Industrial Revolution of Lateral Movement
PDF
Automate or Die: How Automation Reshapes Cybersecurity
DOCX
Game inspiration image links
PPTX
Website support Internet Explorer and other older browsers in 2021
PDF
R user group meeting 25th jan 2017
PPTX
Nic teaming and converged fabric
PPTX
BSides 2016 Presentation
The Industrial Revolution of Lateral Movement
Automate or Die: How Automation Reshapes Cybersecurity
Game inspiration image links
Website support Internet Explorer and other older browsers in 2021
R user group meeting 25th jan 2017
Nic teaming and converged fabric
BSides 2016 Presentation

Viewers also liked (20)

PPTX
Six Degrees of Domain Admin - BloodHound at DEF CON 24
PPTX
Hunting gh0st rat using memory forensics
PDF
I/O, You Own: Regaining Control of Your Disk in the Presence of Bootkits
PDF
Be Social. Use CrowdRE.
PDF
CrowdCasts Monthly: When Pandas Attack
PDF
CrowdCasts Monthly: Mitigating Pass the Hash
PPTX
Tracking Exploit Kits - Virus Bulletin 2016
PDF
Hacking Exposed Live: Mobile Targeted Threats
ODP
Pycon Sec
PDF
Hunting For Exploit Kits
PDF
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
PDF
Venom
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family
PDF
Bear Hunting: History and Attribution of Russian Intelligence Operations
PDF
TOR... ALL THE THINGS
PDF
You Can't Stop The Breach Without Prevention And Detection
PDF
CrowdCast Monthly: Operationalizing Intelligence
PDF
CrowdCasts Monthly: Going Beyond the Indicator
PDF
CrowdCasts Monthly: You Have an Adversary Problem
PDF
Battling Unknown Malware with Machine Learning
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Hunting gh0st rat using memory forensics
I/O, You Own: Regaining Control of Your Disk in the Presence of Bootkits
Be Social. Use CrowdRE.
CrowdCasts Monthly: When Pandas Attack
CrowdCasts Monthly: Mitigating Pass the Hash
Tracking Exploit Kits - Virus Bulletin 2016
Hacking Exposed Live: Mobile Targeted Threats
Pycon Sec
Hunting For Exploit Kits
Java Journal & Pyresso: A Python-Based Framework for Debugging Java
Venom
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Bear Hunting: History and Attribution of Russian Intelligence Operations
TOR... ALL THE THINGS
You Can't Stop The Breach Without Prevention And Detection
CrowdCast Monthly: Operationalizing Intelligence
CrowdCasts Monthly: Going Beyond the Indicator
CrowdCasts Monthly: You Have an Adversary Problem
Battling Unknown Malware with Machine Learning
Ad

More from Tal Be'ery (15)

PPTX
2 Become One, 1 Becomes Two: Attacking and Protecting 2FA Tokens
PDF
Give me some (key) space!
PPTX
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
PDF
Understanding Compound‘s Liquidation
PDF
Web3 Security: The Blockchain is Your SIEM
PPTX
The Color of Money
PDF
Open Sesame: Picking Locks with Cortana
PPTX
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
PDF
Target Breach Analysis
PPTX
Battlefield network
PPTX
Client sidesec 2013-intro
PPTX
Client sidesec 2013 - non js
PPTX
Client sidesec 2013 - script injection
PPTX
One Key to Rule Them All: Detecting the Skeleton Key Malware
PPTX
Skeleton key malware detection owasp
2 Become One, 1 Becomes Two: Attacking and Protecting 2FA Tokens
Give me some (key) space!
Web3’s red pill: Smashing Web3 transaction simulations for fun and profit
Understanding Compound‘s Liquidation
Web3 Security: The Blockchain is Your SIEM
The Color of Money
Open Sesame: Picking Locks with Cortana
THE VOICE OF ESAU: HACKING ENTERPRISES THROUGH VOICE INTERFACES
Target Breach Analysis
Battlefield network
Client sidesec 2013-intro
Client sidesec 2013 - non js
Client sidesec 2013 - script injection
One Key to Rule Them All: Detecting the Skeleton Key Malware
Skeleton key malware detection owasp
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation theory and applications.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
KodekX | Application Modernization Development
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation theory and applications.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
KodekX | Application Modernization Development
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?

The Enemy Within: Stopping Advanced Attacks Against Local Users

Editor's Notes

  • #7: Initial Recon: Attackers Goal: Identify interesting assets. Find all users, machines, etc. Attackers are not administrator on the machine Means: SAMR Recon (net group/user) DNS Recon Local privilege escalation Attackers Goal: become local administrator Means Compromised Creds Of a Domain User who has Local administrator privileges Of a Local administrator privileges 0 days / Known vulnerabilities (CVEs) Compromise Credentials Attacker Goals: Get creds to expand toward destination Means: Windows cred harvesting Tools Mimikatz Passwords in Group Policy Passwords in plaintext “passwords.txt” In E-mail Admin recon Attackers’ Goal: Find machines that has Admin creds on Means: NetSess Luring admin Creating an IT ticket and waiting for admin to connect Remote Code Execution Attackers’ Goals: take over another machine using compromised creds Means: PsExec (new remote service) Remote ScheduleTask WMI Remote PowerShell RDP Remote Registry Lateral Movement Vehicle is Remote Code Execution Fuel is Compromised Creds Map is provided by Recon Ignition Key is Local privilege Escalation That’s how real world attacks look like. There are multiple stages in the APT taking place within months. None of the traditional security vendors like SIEMs, IPSs,IDSs, etc’ provide solutions for detecting compromised credentials, lateral movement and other elements present in every APT. ATAs (and UEBA in general) focus *EXACTLY* on this blind-spot and provide detection capabilities for the different stages based on UEBA. That’s why there’s why a new market for UEBA solutions emerged in the last year: Detect attackers before they cause damage. That’s how real world attacks look like. There are multiple stages in the APT taking place within months. None of the traditional security vendors like SIEMs, IPSs, IDSs, etc’ provide solutions for detecting compromised credentials, lateral movement and other elements present in every APT. ATAs (and UEBA in general) focus *EXACTLY* on this blind-spot and provide detection capabilities for the different stages based on UEBA. That’s why there’s why a new market for UEBA solutions emerged in the last year: Detect attackers before they cause damage.
  • #8: Domain dominance Attackers Goal: Get full control over the domain, i.e. access all assets, all the time Means NTDS.DIT stealing to get all keys DC-SYNC Backup utils Create new admins Compromise KRBTGT key for Golden Ticket Install the Skeleton Key Malware Get more secrets with DPAPI Attacking Data Attackers Goal: Get the data they are after Lateral Movement Same Same, But different Fast and Easy: attackers’ has all credentials Some Subject Matter Expertise (SME) might be required Reading documents - That’s how real world attacks look like. There are multiple stages in the APT taking place within months. None of the traditional security vendors like SIEMs, IPSs, IDSs, etc’ provide solutions for detecting compromised credentials, lateral movement and other elements present in every APT. ATAs (and UEBA in general) focus *EXACTLY* on this blind-spot and provide detection capabilities for the different stages based on UEBA. That’s why there’s why a new market for UEBA solutions emerged in the last year: Detect attackers before they cause damage.
  • #9: This is where ATA focuses on. Detect attackers before they cause damage. That’s how real world attacks look like. There are multiple stages in the APT taking place within months. None of the traditional security vendors like SIEMs, IPSs, IDSs, etc’ provide solutions for detecting compromised credentials, lateral movement and other elements present in every APT. ATAs (and UEBA in general) focus *EXACTLY* on this blind-spot and provide detection capabilities for the different stages based on UEBA. That’s why there’s why a new market for UEBA solutions emerged in the last year:
  • #15: Infiltrate the network by compromising domain account (phishing etc) Eventually compromise domain admin creds Shortest path
  • #16: Prioritize list of assets Be aware of relationships & dependencies
  • #17: Not enough to think in graphs Explicitly – IT wants a “master key” Implicitly – Image prepared in advance Local Users are copied
  • #18: Remove such policies
  • #19: No password is needed A graph “link” from any other computer to such machines
  • #20: Local Privilege Escalation: Attackers can escalate to local Admin with BruteForce Compromise creds: Local user hash can be harvested from memory/disk If the remote machine’s local user has the same password PtH works (no cracking) Admin Recon: Local admins of a machine can be remotely queried Remote Code Execution: Can be done with remote machine local user’s creds
  • #22: Brute force to obtain local privileged user credentials Small tool written in C# Expects a username & password dictionary High rate – more than 200k attempts per minute Authentication is performed locally No traffic overhead
  • #25: Valuable information
  • #26: Misconception that the damage of local accounts is limited to the boundaries of the individual machine However – these accounts can be used to compromise the entire domain
  • #28: How common is the use of local credentials during real attacks? Enables attackers to execute the PtH attack using local accounts Used in most cases! Attackers one step ahead of the defenders
  • #29: More ways for attackers to use local accounts during an attack Adding For persistency “Reverse hardening” Disrupts defenders
  • #30: Again – how common is this scenario? Here is a real example of a malware found on Azure One of the things that it does is add…
  • #35: Periodically query Local Users over SAMR Users Info Group membership Discover security issues: Abnormal login patterns BruteForce attempts Enabled Guest accounts Privileged group modifications Password configuration issues Cloned Local Users
  • #36: Fetches all domain machines records from DC over LDAP Remotely scans all domain machines using the SAMR protocol Retrieves all local accounts’ data from SAM
  • #37: 2 types of detections: Configuration issues found from a single scan (cloned, guest) Deltas found between each 2 consecutive scans that may indicate a potential attack