Manage Privileged Identities Flashcards
JIT JEA PAWs LAPS
What are some avenues of attack that lead to credential theft?
- Logging into unsecured systems with privileged accounts
- Browsing the internet with privileged accounts
- Configuring local privileged accounts with the same creds across many systems
- Overuse/overpopulation of privileged groups
- Insufficient management of Domain Controller Security.
What kinds of accounts are often targeted in credential theft or privilege escalation attacks?
- Permanently privileged accounts
- VIP Accounts (CEO, CFO, etc.)
- “Privileged-attached” directory accounts
- Domain Controllers
- Other identity servers (PKI, Management, etc.)
In which version of Windows were Audit Subcategories introduced?
Server 2008
In which version of Windows were Advanced Audit Policies introduced?
Server 2008 R2
In which scenarios would you want to most commonly disable User Account Control (UAC)?
Server Core installations (it is disabled by default for Server Core)
On a member server, if the local administrator account is disabled, does that prevent the account from being used in a break-glass/failsafe scenario?
No. If a system is booted into safe mode, the built-in administrator may be used even if disabled.
In which version of Windows was RDP Restricted Admin Mode Introduced?
Server 2012 R / Windows 8.1
What does RDP RestrictedAdmin mode do?
RestrictedAdmin mode does not transmit the user’s credentials to the host by the RDP client. The RDP client attempts to do an interactive logon with the host. The host verifies the credentials and assures that the account has administrative rights and supports RDP RestrictedAdmin and connects.
Credentials are not sent in plain-text or any other reusable forms to remote systems with RDP RestrictedAdmin.
What is a Pass The Hash (PtH) attack?
PtH is a technique where an attacker captures account credentials on one system and then uses them to authenticate to another computer on the network.
What are some fundamental requirements for a Pass-the-Hash attack to be successful?
- Access to a system
- Local administrative rights on a system
- Access to a second, or more, system to use the discovered credentials.
What is the simplest way to prevent a Pass-the-Hash attack from occurring on a system?
Never logon to the system with privileged credentials.
What is Lateral Movement?
An attacker user credentials obtained from a compromised system to gain access to another system of the same value in the organization.
What is privilege escalation?
Attacker uses credentials obtained from a compromised computer to gain access to another computer of higher value in the organization.
What are some locations where credentials are stored on a Windows computer?
- SAM Database
- Lsass Process
- Active Directory Database
- Credential Manager (CredMan)
- LSA Secrets stored in the registry
What behaviors on the network could result in a Pass-the-Hash being successful?
- High privilege domain accounts used to logon to systems
- Applications running with high privileges
- Scheduled tasks running with high privileges
- Local Admin rights given to ordinary accounts
- Privileged accounts used to browse the internet
- Same password used for all built-in Admin accounts
- Account termination is not enforced in Domain Admin, EA, or other highly privileged accounts.
- Poor update strategy
- Shared accounts
- Overprivileged and high privileged service accounts
- Too many administrators
What are some common mitigations for Pass-the-Hash?
- Restrict and protect highly privileged domain accounts
- Restrict and protect local accounts with admin rights
- Restrict inbound traffic via Windows Firewall
- Restrict software on systems.
When considering Pass-the-Hash, what is meant by “Restrict and protect highly privileged domain accounts?
- Limit number of admins
- No email for administrative accounts
- Limit logon servers
- Use Smart Cards
- Use Jump Servers / PAWs
When considering Pass-the-Hash, what is meant by “Restrict and protect local accounts with admin rights”?
- Remove standard users from Local Admins
- Do not reuse built-in admin account passwords (LAPS)
When considering Pass-the-Hash, what is meant by “Restrict inbound traffic via the Windows Firewall”?
- Deny internet access for privileged accounts
- Limit where logons can come from
When considering Pass-the-Hash, what is meant by “Restrict software on systems”?
- Windows Updates should be installed regularly
- Restrict which management tools that can be used and how
- Remove LM and NTLM usage
What is a Pass-the-Ticket attack?
Similar to PtH except the Kerberos TGT is acquired and reused
What is the default lifespan of a Kerberos ticket?
10 hours before renewal. 7 days before needing to be requested entirely
How are Pass-the-Ticket attacks less useful than Pass-the-Hash attacks?
Pass-the-Hash is valid until a user changes their password (30-90 days in most orgs; sometimes never)
Due to the nature of how Kerberos works, PtT tickets expire after a period of time limiting how long an attacker can store and use the tickets.
Why is it bad to allow sensitive domain accounts to be trusted for delegation?
If the service or server being authenticated is trusted for unconstrained delegation, the client sends a TGT and session key. The attacker could use this information ti impersonate clients using the captured TGT.