Red Team:

Evasion:

Mimikatz:

  • Forged TGTs have a default max age of 10 years.

Active Directory:

  • Enterprise Admins only appear in the root forest.

    • Enterprise Admin group have complete control of the entire forest (all the domains in the forest) where as the Domain Admins have access only to their specific domain.

Pass the hash and Over pass the hash:

Process
Explanation

Winlogon

Windows Logon Process

Schannell

Secure connection such as SSL, TLS

IKE

Internet Key Exchange protocol process

Secondary Logon Service

(runas)- SecLogo

Advapi

Web-based logon: IIS logon

PKU2U

User-2-User Public Key Cryptograph

Kerberos

Ticket-based, for secure nodes communication over non-secure network, domain

NtLmSsp

NT Lan Manager Hash-based – used locally

Overpass the hash:

Uses an NTLM hash to grab kerberous ticket.

  • Will sometimes result in RC4 TGT being requested if TA doesn't specify where encryption type.

  • 4624 – An account was successfully logged on. (Logon type = 9 Logon Process = Seclogo)

ACLs:

Access Control List (ACL)

It is a list of Access Control Entries (ACE) - ACE corresponds to individual permission or audits access. Who has permission and what can be done on an object?

Two types: –

  • DACL - Defines the permissions trustees (a user or group) have on an object.

    • Discretionary Access Control List

  • SACL - Logs success and failure audit messages when an object is accessed.

    • system access control list

ACLs are vital to security architecture of AD.

ACE:

  • An ACE is an access control entry in an access control list (ACL)

AdminSDHolder:

  • Sanitization group that will clean/overwrite the ACLs of protected groups (Domain Admins) to protect the group.

    • Cleans hourly.

Trusts:

Default/Automatic Trusts

  • Parent-child trust:

    • It is created automatically between the new domain and the domain that precedes it in the namespace hierarchy, whenever a new domain is added in a tree. For example, dollarcorp.moneycorp.local is a child of moneycorp.local

    • This trust is always two-way transitive.

  • Tree-root trust:

    • It is created automatically between whenever a new domain tree is added to a forest root.

    • This trust is always two-way transitive.

Forrest trusts:

  • Non-transitive

  • Forest 1 can access forest 2, but cannot access forest 3.

External trusts:

  • Non-transitive:

  • Z can access B and C, but not A.

User Hunting:

Remote registry:

  • Enabled by default on servers and does not require local admin to enumerate the HKCU for user presence.

  • If remote registry service is disabled, it will not start up when queried.

PowerView:

  • Find-LocalAdminAccess can create a lot of 4624s on the DC and be used for detections.

  • Hunting for large amount of 4624s or 4625s on the DC from one user can be indicative of user scanning.

Last updated