Common Hacker Tools that Complement Mimikatz

Common Hacker Tools that Complement Mimikatz

Mimikatz?is a popular post-exploitation tool that hackers use for lateral movement and?privilege escalation. While?Mimikatz?is quite powerful, it does have some important limitations:

  • It requires local admin rights on the compromised machine.
  • Organizations can block Mimikatz from executing by enabling PowerShell protections.
  • Using Mimikatz effectively requires specialized skills and considerable time.

As a result, other toolkits have been created to complement Mimikatz. This article explains how three of them — Empire, DeathStar and CrackMapExec — make attacks easier for adversaries.

Empire

Privilege Escalation

By denying local admin rights to standard users, organizations can help prevent attackers from stealing credentials using Mimikatz. To get around this, adversaries can turn to Empire, which includes several modules for escalating privileges:

  • The?BypassUAC?module helps hackers bypass User Account Control (UAC) on Windows systems.
  • The?GPP?module takes advantage of a vulnerability in Group Policy Preferences to decrypt passwords stored in a?Group Policy object?(GPO).
  • The?PowerUp?module scans a system for common?privilege escalation?vectors such as misconfigured permissions, vulnerable services and unpatched software. The screenshot below shows this module in action:

In this case, Empire found a DLL hijacking vulnerability, which an adversary could exploit using the following command:?powerup/write dllhijacker.?

Agent Management

Empire also provides an easy-to-use interface that allows an attacker to monitor and interact with agents deployed in a targeted network, as shown in the screenshot below. This command and control feature is made possible using HTTP with a configurable port.

Credential Theft

Empire uses multiple approaches to help Mimikatz steal credentials: It will dump all passwords and password hashes from memory, and even present them in a table for easy viewing:

Empire also works with?DCSync?to steal credentials from?Active Directory?domains by impersonating a domain controller and making replication requests for password data.

DeathStar

DeathStar?is an Empire module that merits its own discussion. It provides a powerful automation engine that empowers adversaries to execute scripts and other Empire modules on a large scale.

DeathStar operates similarly to another post-exploitation tool called?BloodHound. While both tools are used by security professionals and penetration testers for legitimate tasks, they are also misused by hackers for malevolent purposes like network reconnaissance, vulnerability scanning, privilege escalation and lateral movement. The screenshot below shows the DeathStar module in action:

CrackMapExec

CrackMapExe?(CME) is another post-exploitation tool that is a powerful enabler when integrated with Empire and DeathStar.

Domain Reconnaissance

CrackMapExec simplifies the reconnaissance process for attackers who have gained a foothold in an?AD domain. CME can quickly enumerate the domain’s?password policy?and provide insights into details such as complexity requirements and lockout settings, as shown below:

Enumerating AD Objects

CME will also enumerate all?AD?objects, including users and groups, in a brute-force fashion by guessing every resource identifier (RID), as shown below. (A RID is the ending set of digits in a security identifier [SID].)

Discovering Anti-Virus Tools

CrackMapExec’s?enum_avproducts?module can discover what anti-virus software an organization is using. The output below shows where Windows Defender running:

Understanding an Account’s Rights

The lateral movement capabilities of CrackMapExec are very valuable. For instance, an adversary can discover all hosts in a specified IP range and whether a particular account has rights on those hosts, as shown here:

How Netwrix Can Help

By integrating tools like Empire, CrackMapExec and DeathStar with Mimikatz, threat actors who have gained a foothold in your Windows environment gain the ability to move laterally and escalate their privileges. While there are some basic?PowerShell protections?that can be enabled to detect and mitigate these types of attacks, those protections can be easily?bypassed?by experienced hackers.

One proven way to protect your organization from these malicious toolsets and other attacks is the?Netwrix Active Directory Security Solution. It helps secure your Active Directory from end to end by empowering you to:

  • Proactively identify and mitigate security gaps
  • Promptly detect and respond to threats
  • Recover quickly from security incidents to minimize downtime and other business impacts

With the Netwrix?Active Directory Security Solution, you can be assured that all your AD identities and the underlying AD infrastructure that supports them are clean, properly configured, continually monitored and tightly controlled, making the job of your IT teams easier and your organization more secure.


?? To better understand how various attacks are executed and get equipped with mitigation, detection and prevention tactics, explore our Attack Catalog.


?? Watch the Ultimate Cyber Battle: Hacker vs. Netwrix and witness Brian Johnson, a skilled white-hat hacker, launch a barrage of common attacks against an IT environment. You’ll discover, step by step, how Netwrix solutions emerge triumphant by implementing the principle of least privilege across endpoints.

Attacks featured in the webinar will include:

·?????? Exploiting local admin access (which is often granted excessively!) to extract cleartext credentials from memory

·?????? Performing lateral movement from one compromised system to gain local admin privileges across the network

·?????? Abusing open RDP access to remotely infiltrate a system with admin privileges and then extracting copies of the AD database or exfiltrating sensitive content

·?????? Utilizing downloadable malware

·?????? Exploiting USB devices

要查看或添加评论,请登录

Netwrix Corporation的更多文章

社区洞察

其他会员也浏览了