The third or fourth step in any breach (depending on who you talk to) is that an attacker must ‘gain authority’. Think of it like a bank; if the criminal breaks into the vestibule they have little or nothing to steal, they have to get from the vestibule to the main area of the bank, then they need move to the vault where the cash is stored. Each step requires gaining authority over the area where the valuables are stored. The same thing is true on networks, provided that at least some level of least privilege was performed ahead of time, and the network’s data or “valuables” aren’t just sitting there for the taking.
In our scenario, Admin Assistant Dave gets phished and the bad guys ‘hook’ his Windows 10 machine. Dave is not a local administrator and only has access to the things he needs to do his job. Our bad actor didn’t go through all this for that little haul, plus to gain persistence and drop malware (the real goal) he needs admin rights, first local and ultimately domain. This is where it gets interesting.
There are basically 5 ways that attackers harvest credentials on a Windows network in order to gain authority:
If a business has the will, the fortitude, the budget and resources, they could thwart 90% of these methods and make the other 10% difficult. How?
Hashes –
Tokens –
Cached Credentials –
LSA Secrets –
Tickets –
So why doesn’t every organization just do these things? One reason is budget. As you can see many of the features to perform this sort of hardening require up-to-date systems. That requires budget and time.
Next, knowledge is required. Group managed accounts have been around for a while but few know about them and use them. We see all the time in our consulting engagements where service accounts are just Domain Admins and not restricted and these features are not put into use. Many times, this is because of lack of resources in IT as this is the easy way to make sure everything functions, but it is not the right or secure way.
Finally limiting local administrator accounts by using LAPS (local administrator password system) a free tool from Microsoft, and restricting tools such as PowerShell remoting, to known-good jump boxes fills out the methods of controlling lateral movement. By doing these things we put the adversary in a box -they may get into the vestibule but they can’t get into the bank.