Aug 1, 2021

Trimarc Security Assessment: Protecting AD Administration



Compromise mgmt system for access:

  • Microsoft SCCM admin account - push packages
  • Microsoft SCOM admin account - run commands
  • Splunk server - run scripts on system (Splunk Universal Forwarder)
  • Vuln Scanners - extract stored credential.
  • Endpoint Detection/Response (EDR) - run scripts/commands/code
  • Microsoft Intune - run scripts on Azure AD.

Notes:

  1. DON'T run management tools on local workstations.
  2. Smart card PIN is cached and can be extracted by Mimikatz.
  3. Hijack Jump-server with tscon.exe (as SYSTEM).
  4. MFA is only as good as its configuration.
  5. MFA can be subverted. (self-service/SMS)
  6. MFA may be configured to be fail-open.
  7. Password vault becomes part of the AD security posture.
  8. Password vault: vulnerable to keylogger.
  9. Password vault: RDP Proxy (browser extension)
  10. Admin Deployment: AD admins, Virtual Infra admins, Cloud admins, Server admins, workstation admins.
  11. Admin Forest = Red Forest (ESAE)
  12. Admin Forest doesn't fix production AD security issues.
  13. Agents on DC will be the target.
  14. Modern Admin Forest = "Cloud" Admin Forest / ESAE
  15. Quick lockdown via Microsoft Intune by leveraging policies.