Detect Active Directory Compromise with SIEM Query Programming

Detect Active Directory Compromise with SIEM Query Programming

Hi Everyone,

I attended a Semperis Purple Knight webinar hosted by Sean Deuby today. He mentioned the Five Eyes research document published by the Australian Government Signals Directorate called "Detecting and Mitigating Active Directory Compromises". Active Directory is a primary focal point for malicious actors so I would highly recommend to those who are utilizing a SIEM to take advantage of the knowledge in this document.

The document mentioned contains detection queries that can be programmed into a SIEM to alert on the following attack methods:

Detecting and Mitigating Active Directory Compromise

  • Kerberoasting
  • Authentication Server Response (AS-REP) Roasting
  • Password Spraying
  • MachineAccountQuota Compromise
  • Unconstrained Delegation
  • Password in Group Policy Preferences (GPP) Compromise
  • Active Director Certificate Services (AD CS) Compromise
  • Golden Certificate
  • DCSync
  • Dumping ntds.dit
  • Golden Ticket
  • Silver Ticket
  • Golden Security Assertion Markup Language (SAML)
  • Microsoft Entra Connect Compromise
  • One-way Domain Trust Bypass
  • Security Identifier (SID) History Compromise
  • Skeleton Key

Detecting Active Directory Compromise with Canaries

The use canary objects in Active Directory is an effective technique to detect Active Directory compromises. The benefit of this technique is that it does not rely on correlating event logs, providing a strong indication a compromise has happened. Notably, this technique does not rely on detecting the tooling used by malicious actors (like some other detection techniques do), but instead detects the compromise itself. As such, it is more likely to accurately detect compromises against Active Directory.

The following Active Directory compromises can be detected using this technique:

  • Kerberoasting
  • AS-REP Roasting
  • DCSync

Please note that the SIEM query programming will greatly improve your detection capabilities. The document also contains mitigation efforts that can be undertaken by other infrastructure teams to harden the various areas under their management so it would be extremely beneficial to collaborate with them on it. This is a great opportunity where everyone can come together to try to be as proactive as possible to avoid an incident that may have been able to be prevented by doing some upfront hardening efforts.

Michael Costakis

Senior Systems Architecture Administrator

4 个月

Definitely adding to my reading list, I regularly use Purple Knight and leverage it to mitigate various privilege escalation issues or in detecting stale accounts on various levels. Great product! Thanks for sharing Travis, only getting to see this in my feed now and glad I did.

要查看或添加评论,请登录

Travis Kench, CISSP的更多文章

  • iPhone Dual-SIM Config

    iPhone Dual-SIM Config

    PROBLEM: You are currently carrying and having to charge two separate phones, one for work and the other for your…

  • A speech to inspire all...

    A speech to inspire all...

    This is the stuff that drives me and no it isn’t a Smartsheet! (inside joke for all my colleagues who read this post) I…

  • What I do and why I love my career...

    What I do and why I love my career...

    What is your technical background? Over the past 13 years, I have had the privilege of growing exponentially within a…

    2 条评论
  • Recipe: The Ingredients To Do Better

    Recipe: The Ingredients To Do Better

    I came across this image today which contained some of the most profound simple lessons that can greatly improve a…

  • Being a generalist isn't a bad thing...

    Being a generalist isn't a bad thing...

    As a generalist for the past 13 years at times I thought that I was behind the curve because I never had the ability to…

    5 条评论
  • CISSP Exam Prep Outline

    CISSP Exam Prep Outline

    Hi Everyone, I have been studying for the CISSP certification for about 2 weeks now. I have read through numerous…

    3 条评论
  • BEWARE PHONE SCAM

    BEWARE PHONE SCAM

    Tonight, I personally received (4) phone calls from a scam artist using a pre-recorded message that is described in the…

    1 条评论

社区洞察