Active Directory (Part 8)
LDAP Bind Credentials
Every authentication protocol and security system contains some vulnerable ways to exploit them. Similarly, some of the LDAP authentication attack methods that a penetration tester can utilize are:
- LDAP injection- In this attack, the tester injects malicious LDAP statements into an application's LDAP queries, allowing them to gain unauthorized access to network resources or manipulate data stored in AD.
- LDAP authentication bypass- In this one, the tester bypasses the LDAP authentication process to gain unauthorized access to network resources or manipulate data stored in AD.
- LDAP enumeration- It is a type of attack in which the tester uses LDAP to gather information about the AD environment, like user accounts, group policies, and other objects, to gain unauthorized access to network resources or manipulate data stored in AD.
- LDAP pass-back attack- An attack in which the tester creates a rogue AD domain controller and uses LDAP to authenticate users and manage access to network resources, allowing them to gain unauthorized access to network resources or manipulate data stored in AD.
Authentication Relays
Authentication relay offers many benefits to an AD environment. It helps the organization in easy expansion of their Ad infrastructure to remote locations without having to setup extra domain controllers. It also allows the centralized management of AD environment, as all authentication requests are processed via relay rather than being handled individually by each domain controller.
There are a few ways to configure authentication relay according to the specific needs of an organization. Some of them includes dedicated authentication relay server, configuring an existing server as an authentication relay, or using a cloud-based authentication service.
A penetration tester can also leverage SMB protocol. It governs everything, from inner network file-sharing to remote administration. The security of older versions of this protocol was insufficient and many vulnerabilities as well as exploits were discovered. However, many of them has been resolved in its newer versions, often organization do not use them since legacy systems do not support them. The two different exploits of NetNTLM authentication with SMB are:
- Since the NTLM Challenges can be intercepted, offline cracking techniques can be used to recover the password associated with the NTLM challenge. However, the cracking process is rather slower than cracking NTLM hashes directly.
- Use rogue device to stage a man in the middle attack, relaying the SMB authentication between the client and server which will provide an active authenticated session and access to the target server.
Comments
Post a Comment