Active Directory (Part 9)
Microsoft Deployment Toolkit
Generally, MDT is used with Microsoft's SCCM, which is a tool for managing updates for all Microsoft applications, services, and operating systems. MDT is designed such that it can easily deploy new images, allowing the IT staff to preconfigure and manage boot images. Hence, even if a new device is added to the network, it will be automatically configured with necessary software settings by simply connecting it to the network.
The SCCM is like an extension to the MDT. However, SCCM is responsible for managing updates and patches for all software installed across the organization's IT infrastructure. It helps the IT staff in reviewing the available updates and test them in a sandbox environment before deploying them centrally to all domain-joined devices.
But, tools like SCCM and MDT that offers centralized management of IT infrastructure, can also be targeted by the attackers who seek to take control of large amount portions of the organization's critical functions. So, it is important to secure these tools ad properly configure them to prevent unauthorized access or exploitation by the attackers.
The most common feature used by the organizations is PXE boot. It allows the new devices that are connected to the network to load and install the OS over a network connection. the communication flow between the different components involved in the PXE boot process would be:
- User sends DHCP Discover (requests IP address and PXE service info)
- Server sends DHCP Offer (sends open IP and PXE service info)
- User sends DHCP Request (accepts IP address)
- Server sends DHCP Acknowledge
- Client performs Boot Service Discover
- Server Acknowledge (sends PXE boot information)
- Client requests PXE Boot via TFTP
- Server delivers PXE Boot via TFTP
Once the process is performed, the client will use a TFTP connection to download the PXE boot image. The penetration tester can then be able to exploit the PXE boot image for following purposes:
- Inject a privilege escalation vector, such as a Local Administrator account, to gain Administrative access to the OS once the PXE boot has been completed.
- Perform password scraping attacks to recover AD credentials used during the install.
Configuration Files
- Web application config files
- Service configuration files
- Registry keys
- Centrally deployed applications
Various steps that an organization can take to mitigate the risk of attacks on the Active Directory environment are as follows:
- User awareness and training- Training users to be aware of potential threats and to be cautious about disclosing sensitive information, like login credentials, will reduce the risk of an attack.
- Limiting the exposure of AD services and applications online- Many services and applications, like NTLM and LDAP authentication, need not to be accessed via internet. They can be placed in an intranet environment that can be accessed through VPN (Virtual Private Network), providing additional security through the use of multi-factor authentication.
- Enforcing Network Access Control (NAC)- It can prevent attackers from connecting rogue devices to the network. But, it might require extra efforts to allow the listing of legitimate devices.
- Enforcing SMB signing- It can help prevent SMB relay attacks.
- Following the principle of least privilege- Following this rule especially for the credentials used for services, will reduce the risk of their compromise to a large extent.
The above measures will help an organization in protecting their AD environment from potential attacks.
Comments
Post a Comment