Tactics, Techniques and Procedures for Attacking Active Directory�BlackHat USA 2019
2
Ryan Hausknecht
Andy Robbins
Rohan Vazarkar
Julian Catrambone
Kelly Villanueva
Calvin Hedler
Carlo Alcantara
You can find us at:
Specterops.io
@SpecterOps
Outline (morning segment 1)
10:00-10:15: Derivative Local Admin Lecture
10:15-10:30: Lab
10:30-10:45: ACL Attacks
10:45-11:00: Lab
11:00-11:15: Kerberos Attacks
11:20: Room changeover
3
3
Outline (morning segment 2)
11:30-11:45: Derivative Local Admin Lecture
11:45-12:00: Lab
12:00-12:15: ACL Attacks
12:15-12:30: Lab
12:30-12:45: Kerberos Attacks
4
4
Outline (afternoon segment 1)
2:00-2:15: Derivative Local Admin Lecture
2:15-2:30: Lab
2:30-2:45: ACL Attacks
2:45-3:00: Lab
3:00-3:15: Kerberos Attacks
3:30: Room changeover
5
5
Outline (afternoon segment 2)
3:45-4:00: Derivative Local Admin Lecture
4:00-4:15: Lab
4:15-4:30: ACL Attacks
4:30-4:45: Lab
4:45-5:00: Kerberos Attacks
5:15: Room shutdown
6
6
7
Domain Controller
Data Collector
BloodHound DB
BloodHound Client
Domain-Joined Computers
Domain-Joined Computers
Firewall
TCP 389, 445�UDP 53
TCP 445
TCP 445
TCP 445
TCP 7687
TCP 7687
Data Collection Architecture and Logical Access Requirements
Data Collection w/ SharpHound
8
8
Data Collection w/ SharpHound
9
9
Derivative Local Admin
11
12
13
14
15
16
17
18
19
20
21
Domain Admin!
22
Domain Admin!
An effective, albeit tedious and naive approach...
23
Target Users:
Admin-1
Admin-2
Admin-3
Admin-4
Admin-5
Admin-1 Uses These Systems:
Computer-1
Computer-2
Computer-3
Admins on Computer-1:
Admin-1
Admin-2
Admin-10
Group-11
Members of Group 11 Use These Systems:
Computer-1
Computer-2
Computer-5
Admins on Computer-5:
Admin-1
Admin-2
Admin-10
Admin-15
Admin-15 Uses These Systems:
Computer-1
Computer-2
Computer-10
Members of Group-11:
Admin-5
Admin-6
Admin-7
Admin-8
24
Domain Admins
Alice Admin
Computer 1
Bob User
Helpdesk Group
MemberOf
MemberOf
HasSession
AdminTo
Local Admin Abuses
25
25
Lab
28
28
ACL Attacks
ForceChangePassword
30
30
AddMember
31
31
DCSync
32
32
DCSync (continued)
33
33
GPO Control
34
34
Lab
37
37
Kerberos Attacks
Three Kerberos Issues to Focus on
39
39
Kerberoast
40
40
Unconstrained Delegation
41
41
Unconstrained Delegation
42
42
Constrained Delegation
43
43
Constrained Delegation
44
44
THANKS!
45