Showing posts with label safety. Show all posts
Showing posts with label safety. Show all posts

Monday, October 26, 2015

Mitigation against Mimikatz, WCE, PTH, PTT, Etc.

Mimikatz and Active Directory Kerberos Attacks

Nice Overview of Mimikatz and the many ways it can be used to steal, mimic, create, and bypass credential management in Windows.


Password-Stealing Tool Targets Windows; Evades Antivirus

To protect against pass the hash attacks, Microsoft recommended two methods that aren’t viable or practical, from Aorato.com’s perspective:
  • Implement smart card authentication (smart cards are expensive and difficult to deploy throughout an enterprise)
  • Remove the weaker encryption algorithm from the systems (this requires removing its use throughout the enterprise, which can prevent users from accessing older systems)

Malware Lateral Movement: A Primer


What can you do to detect and contain the threat actors creeping around in the dark space of your network?
First, you need to be able to shine a light into that dark space and get visibility into what you are missing. Below are some recommendations that will help you do just that:
  • Gathering Threat Intelligence about the tools, tactics and procedures of the malicious actors and their campaigns
  • Have a threat analytics platform to identify and consolidate the information that will give your analyst the ability to do more proactive hunting for these types of techniques 
  • Proactively perform forensics and sweeping of endpoints for indicators of compromise 
  • Harden the devices that are on your network by removing any non-required applications or services and preforming proactive application and system configuration management and logging 
  • Implement tighter controls and proactive monitoring of credentials and applications, utilizing whitelisting and multifactor authentication methods. 
  • Perform data exfiltration identification and monitoring by utilizing full packet analysis and monitoring tools.

Pass-the-Ticket Countermeasures 

In general, Pass-the-Ticket exploits can’t be blocked by standard cyber security defenses because compromised tickets aren’t invalidated when local or domain passwords are changed. And while multifactor authentication is typically a sound verification practice, Pass-the-Ticket exploits bypass it altogether.
Instead, protecting against Pass-the-Ticket requires a different approach on the part of IT. Here are three steps in a Pass-the-Ticket defense process:
  1. Stabilize the IT Environment: As stated above, Pass-the-Ticket attacks exploit the default authentication in Windows domains, allowing hackers to impersonate users or processes to gain lateral movement on a network. To counter this attack, you need to reduce the attack surface of your network. That involves enforcing frequent,  automated credentials updates and secure escalation to impede lateral movement. Start by removing weak, shared local administrator logins. Replace them with cryptographically complex and unique credentials that are frequently changed. And then audit access to the credentials.
  1. Enforce Secure Privileged Escalation: Further reduce your attack surface by minimizing the presence of highly privileged logins that attackers can use to gain control of your network. Consider a privileged identity management solution that grants users delegated privileged access, and gives authorized administrators temporary membership in pre-defined groups with elevated privileges. These measures limit the ability of cyber attackers to access additional network resources after they’ve exploited a computer or impersonated a user through Pass-the-Ticket.
  1. Rapid Remediation Process: Establish, in advance, a process to remove attackers’ access to compromised systems. This can be accomplished through a system that changes passwords twice on potentially compromised machines. The two password resets force immediate replication of changed credentials everywhere on the domain to block the use of compromised tickets.The password resets can be used in conjunction with automatic, chained reboots of managed machines after user escalation, or after changes to systems are implemented using escalated credentials. Privileged access management vendor Lieberman Software calls this process a Security DoubleTap™. It clears the system memory of hashes and passwords on compromised machines to curtail further access.

Lieberman Software’s Security Double-Tap™ Defeats Golden Ticket Cyber Attacks


While PTH is a more widely known threat, the related PTT attack is just as dangerous. PTT attacks target Kerberos, the default authentication protocol in Windows domains. These attacks exploit Kerberos by hacking the server that stores a secret key protecting authentication. Once the attacker obtains this secret key, he gains unrestricted access throughout the IT environment – essentially a “Golden Ticket”. The attacks are launched using tools freely available online, such as WCE and Mimikatz.  

Removing Pass-the-Ticket Access from Compromised Machines

ERPM now provides an automated double password reset specifically designed to combat the Golden Ticket attack. The two password resets – a Security Double-Tap - force rapid replication of the changed credentials throughout the domain, to block the use of compromised accounts. In conjunction with this process, ERPM can also force an automatic chained reboot of target system to clear memory of hashes and passwords, and prevent memory scraping.  

Practical Attacks Against Multifactor

"Multifactor authentication will keep the bad guys out" is the hue and cry of hardeners everywhere, so what is the pen-tester to do? This talk will present a variety of practical attacks against multifactor authentication, ranging from basic configuration oversights to attack strategies that might work forever even if they configure it right. Multiple technologies will be presented. Many people trust their MFA implicitly, as if it's a magic talisman of keeping hackers out, but there is much a pen-tester can do (and thus, much the other kind of hacker can do), and it's important to discuss and illustrate the risks. This talk should be useful for you if you're a pen-tester, but also if you are a defender trying to get the most out of your MFA.

Dumping WDigest Creds with Meterpreter Mimikatz/Kiwi in Windows 8.1


The Windows patch that corrects the wdigest issue of storing passwords in clear text, and how to bypass it.

Microsoft’s Local Administrator Password Solution (LAPS)


Microsoft networks remain amongst the most vulnerable and exploited due to the way in which Active Directory is typically deployed: A base image is created with a standard local administrator password, which is duplicated on all workstations in the environment.  When an attacker compromises any workstation, the local administrator password hash can be obtained and used to access every other workstation using the classic Active Directory exploit Pass-the-Hash (PtH). This methodology is described in detail in FireEye/Mandiant M-Trends 2015 case studies.  
On May 1 Microsoft released a new tool, Local Administrator Password Solution (Security  Advisory 3062591), which provides a solution to the Pass-the-Hash exploit. Local Administrator Password Solution (LAPS) changes each local administrator password to a unique value, preventing reuse. LAPS also provides complementary end-user software to  manage local administrative accounts from a centralized server.

Why You Want Two-factor Authentication


Most importantly, 2FA is a tool to ameliorate the security pandemic that is the password. Password re-use, weak password complexity, and insecure credential storage are the harbingers of doom for corporate networks. If you’ve never had the pleasure of using Mimikatz then give it a whirl and enjoy the sinking feeling in your stomach as you realize how your passwords are rarely adequately secured. Even if you use a password manager with long, unique passwords for everything that you log into, you stand to benefit by requiring 2FA as well. 

Sunday, December 27, 2009

Talk to Your Neighbors About Their Open Wireless Access Point


I've run into this several times; We've done all we can to secure our Wireless Access Point, we've added WEP or WPA, setup MAC address restrictions, etc., only to be circumvented by the fact that our neighbor's Access Point is wide open.  There are a couple of reasons for this:
  • Some folks don't care. 
  • They like wide open access, it\'s easy and they want to offer the world their internet connection. 
  • They don't know how to secure it. 
  • I'm sure that this is the most common problem. 
  • It's just too confusing, difficult, etc..
  • They have other intentions. 
A little known fact is that once a computer accesses the inside of someone's network, it becomes vulnerable to whatever is happening on that network. The traffic from all machines can be captured, operating system vulnerabilities can be exploited, and your kids (or you) can become targeted by them.  The most significant problem is that your kids are not using the infrastructure you should be providing.  You've secured yours, you've locked it down, and you control it.  - They are basically "sneaking" out the window at night - using a window that someone else provided.


What should you do?
  • You should find your neighbors wireless access points yourself, and talk to them about the open ones you've found.  If you have a hard time figuring out who they are, you can detect it yourself with a number of tools. One in particular is NetStumbler which can be used to scan your immediate area. With NetStumbler, you can get a signal strength meter - the stronger the signal, the closer you are.  Just use it to find the open access points..  
  • Look at your kids computers, and the wireless preferences, most of the time you'll see profiles for wireless points they've accessed.  If some of these match up with the ones you found in the neighborhood, it's time for a conversation.  
  • Remind your kids to use the internet connection you've provided. If you suspect that they are still using your neighbors connection; speak with your neighbor and let them know that their connection is being used and by whom. You probably would want to highly encourage them to secure the point.  
It pays to know what's going on in you neighborhood. Who's providing points of interest for your kids.  It's kind of an electronic neighborhood watch

Friday, December 4, 2009

Presentation: Combat Readiness In the IT Infrastructure

Content Removed.

3 Tools for Backing Up Your Data


Computers die.  Either from old age, misuse, or some nasty virus.  They just croak and it’s never fun.  I know, I’ve been there.  Had my system all full of cool tools, massive quantities of photos, documents I’ve written, songs I’ve collected – all gone.  Poof!!!   In my experience I’ve found that all computers die eventually.  That’s why it is critically important that you backup your systems.  Here I offer three strategies of making sure your stuff remains even if your system croaks.
1.  Use an external drive (or network drive).  These are relatively cheap for tons of storage.  You can spend around $150.00 and get half a terabyte of storage.  Check out the Maxtor One Touch – it even has software that will help you backup your data with the touch of a button.
2.  Use an online service.  Mozy Remote Desktop Backup service provides a lot of storage for $3.95 plus $.50 per Gigabyte per month.  They’ve had great reviews and a very easy to use interface.
3.  Use your domain provider.  I am amazed at how cheap online domain registration and storage costs now days.  I spend $3.95 per month  to maintainpaulfdixon.com along with unlimited email addresses, unlimited storage, and unlimited bandwidth at justhost.com.  The service provides some very easy to install click installations of online photo galleries, popular blogging tools (like this wordpress blog), ftp and other file storage alternatives.  It is simple to setup and very easy to maintain if you keep on top of it.
The bottom line is =  you have to put some out some effort but it is well worth it.

The FBI's Security Guide for Protecting Children Online


The FBI has put together an excellent resource for protecting your children on-line.  This guide is written for parents and it contains an excellent analysis of how to tell if your kid is doing something on-line that they should not be doing and what to do if you find out.  In summary, they want parents to know:
The signs your child may be at risk to on-line threats:
  • Your child spends large amounts of time on-line, especially at night.
  • You find pornography on your child’s computer.
  • Your child receives phone calls from men you don’t know or is making calls, sometimes long distance, to numbers you don’t recognize
  • Your child receives mail, gifts, or packages from someone you don’t know.
  • Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room.
  • Your child becomes withdrawn from the family.
  • Your child is using an on-line account belonging to someone else.
Click Here for the guide.