Cyber Forensics – Active Directory Investigation

Table of Contents

Critical Analysis of Active Directory Settings in Espionage Investigations

In an industry running on Active Directory, if there is an espionage that needs to be investigated,
a critical analysis of AD settings is important. Active Directory is the backbone of identities for
many organizations around the world, but it is often not managed well, which open the doors for attackers
to compromise it in a minute or two. AD is full of delegated rights and permissions that grant privileges
to security principals (User, Group Managed Service Account, Group and Computer Objects). Some permissions
are more sensitive than others and should be kept only for privileged accounts. Let’s see which of these
sensitive objects are. It depends on how your structure are designed and where you store your sensitive
objects, but there are a couple of standard objects we need to check.

Following attack patterns are important to be observed:

  • Attackers that try to maintain long-term persistence
  • Applications/Service accounts delegated too much privilege
  • Escalation of Privileges

Following permissions are to be observed:

  • Full Control on all objects
  • Create Child Objects
    • Create new user accounts, groups etc.
    • Create dynamic objects, objects with a Time-To-Live and will disappear when TTL is meet.
  • All Extended Rights
    • Password Resets
    • Replicating Directory Changes All
    • Potential access to all confidential attributes.
  • Extended Right: Replicating Directory Changes All
    • This extended rights should ONLY be delegated to services that do password synchronization like the Azure AD Connect tool or other services using DSgetNCChanges for password sync.
    • FIM/MIM does not need this permissions.
  • Reset Passwords
  • Write Property to objects or sensitive attributes
    • Modify group memberships.
    • Write userPrinicpalName.
    • Write altSecIdentities
    • Write userCertificate
    • Write userAccountControl.
    • Write servicePrincipalName.
  • Write Public Information
    • Includes userPrincipalName.
  • Write Membership
    • Includes member and memberOf.
  • Write User Account Restrictions
    • Includes userAccountControl.
  • Write userPrincipalName
    • Access to modify the userPrincipalName could let someone with a valid smart card to logon as someone else by having the SubjAltName field of the smart to match another Active Directory user account.
  • Write userAccountControl
    • Allow blank password.
    • Downgrade Kerberos to DES only.
    • Enable/Disable accounts.
    • Store password using reversible encryption.
  • Write msDS-SupportedEncryptionTypes
    • Downgrade Kerberos encryption.
  • Write Permissions
    • Replace current permissions with new more relaxed or granting access to a malicious account.
  • Write servicePrincipalName
    • By adding a service principal name to an account an attacker could potentially request a Kerberos TGS for the account and save the TGS to a file and perform offline TGS password cracking as long as RC4 Kerberos encryption is allowed.
  • Take Ownership
    • Take ownership and then replace current permissions with new more relaxed or granting access to a malicious account.
  • Link Group Policy Object
    • Introduce new settings that would grant access or apply malicious code on the operating systems.

Prashant Phatak

Founder & CEO, Valency Networks

Prashant Phatak is an accomplished leader in the field of IT and Cyber Security. He is Founder and C-level executive of his own firm Valency Networks. Prashant specializes in Vulnerability assessment and penetration testing (VAPT) of Web, Networks, Mobile Apps, Cloud apps, IoT and OT networks. He is also a certified lead auditor for ISO27001 and ISO22301 compliance.As an proven problem solver, Prashant's expertise is in the field of end to end IT and Cyber security consultancy to various industry sectors.

Related Blogs

Difference Between Privilege Escalation Attack and IDOR Attack

⭐️

Wireshark Tutorial -10 | Creating Wireshark Profiles

⭐️

Wireshark Tutorial -9 | Exporting and Sharing PCAP Files

⭐️

Wireshark Tutorial -8 | Detecting ICMP Floods or DoS Attempts

⭐️

Wireshark Tutorial -7 | Expose passwords sent in plain text

⭐️

Wireshark Tutorial -6 | Analyze HTTP, HTTPS, and DNS traffic