Is misconfiguration of Active Directory deadlier than a vulnerability?

Is misconfiguration of Active Directory deadlier than a vulnerability?

(You can thank me now for the catchy blog title, and thank me later for the Latin lessons you're about to get in this blog but here goes...)

Active Directory (AD) and its cloud-based counterpart Azure Active Directory (AAD) are some of the most widely used technologies in the world. They’re complicated bits of kit. Literally holding the (public and private) keys to our entire organisation.

Is it any wonder then that they’re one of the most popular targets for malicious actors?

AD Fundum

(Latin for: back to basics…)

Our identities are now the entry point to the corporate network. Where previously we relied on a well-configured firewall to protect our organisations from attack, with the rise of the internet and the onslaught of digital transformation projects, we’ve been left with a higgledy-piggledy perimeter reliant on the security of our usernames and passwords.

No alt text provided for this image

But Active Directory isn’t just a list of credentials. We need these for initial entry but then we also need to understand what those credentials will give us access to. Once we get into the network, we find an intricate web of permissions and privileges which grant access to specific folders, files, applications, etc.

Those permissions can be granted in a number of ways:

  • Individually, e.g. John Smith is given access to Finance Folder
  • As a group, e.g. Anyone in the Finance Team AD Group is given access to Finance Folder, anyone in the Senior Management AD Group is given access to the Expenses application
  • As a nested group, e.g. The Finance Team AD Group is added to the Domain Admin AD Group – this means that users in the Finance Group accumulate the higher privileges available as part of the Domain Admin AD Group.

So now we understand in simple terms how AD is constructed, let’s look at how it works in practice.

AD Absurdum

(Latin for: to the point of being nonsensical…)

Let’s think about how a company evolves over time. When you first start a business, you’re a jack of all trades so you set up your own Active Directory or Azure Active Directory and you muddle through until your team gets big enough for a technical bod to join and take over.

Then we start growing. Adding users. A lot of the time there’s little documentation. People don’t tend to document this kind of thing. So when Technical Tina moves on to another role and makes way for IT Manager Mike, naming conventions, group privileges, processes for allocating access… it all goes out the window and then gets reinvented.

No alt text provided for this image

When we get to 100 users, there could be groups created by multiple IT personnel, nested groups, ad hoc user permissions which are then copied over to new starters. It can easily get in to a very complex state.

Interesting fact. Since I started in cyber security back in 2019, I have worked with SEVERAL companies that have had more groups that actual users. Some of those were universities, with thousands of users. Imagine being the poor security team trying to unpick that mess.

AD Augusta per Angusta

(Latin for: Through difficulties to honours – i.e. rise to a high position by overcoming hardships… or privesc?)

So it makes sense that Active Directory is the first place our consultants look when they’re doing an internal network penetration test. It’s not that the service itself is weak, it’s that the setup is complex, and even slight misconfigurations can allow an attacker direct access from base user to domain administrator.

That’s usually what we’re looking for in an internal test – to see whether we can get from a bog standard user account like Carl the Customer Service Agent, Rita the Receptionist or Oscar the Office Admin and elevate our own privileges to get a Domain Admin account. Which would mean you’re royally screwed.

No alt text provided for this image

Domain Admin accounts have ALL of the permissions. They can switch off firewalls. Create new users. They have access to all of the folders. All of the files. PKI. The lot.

If you’ve got several layers of nested groups, a lack of group management, or if you’re blindly copying access roles for new starters, you could be unwittingly giving out a whole host of permissions to users that they just don’t need. And whilst Carl, Rita and Oscar may not know how to abuse those rights, you can bet that a malicious actor with access to their account definitely does.

AD Oculos

(Latin for: obvious to anyone who sees it)

So what can we do about all of this? We don’t really want to rebuild our Active Directory environment… that would be a huge undertaking.

Instead, wouldn’t it be great if there was an easy way to be able to see how an attacker could potentially elevate their own privileges? A way to work out which paths they might take to attack our organisation? And then be able to manage those attack paths?

That would be absolutely fantastic. And guess what… it actually does exist. At Cognisys, we call it Attack Path Management or APM. A service that allows you to see which routes an attacker might take through your Active Directory or Azure Active Directory environment to give them privileges they can use to further their attack on your organisation.

Surprisingly, considering all the complexity we’ve discussed here, APM is a really simple service. Kind of a vulnerability assessment for your identities. But instead of looking at vulnerabilities per se, it looks at misconfigurations in your identity environment to show clear paths to potential trouble.

Of course, APM can’t provide all of the answers, and is no replacement for a hands-on internal infrastructure test, but it’s a great way to dip your toe into the water.

Drop me a line if you're interested in discussing with myself or Shaun Whorton how a review of AD could benefit your organisation!

Donavan Cheah (谢承铅)

Consultant (CISSP, CRISC) | Pentester (OSCP, OSCE3) | MBA holder | Overseas Conference Speaker | Creator of Cybersecurity Card Game | ISACA, ISC2 and Vulnhub Contributor | GaTech Masters Student | Mentor

2 年

Yes enumerating bad AD permissions should be part and parcel of a periodic cybersecurity posture check. Misconfigurations in AD permissions, especially in moderately complicated user environments (and up), tend to result in complete domain compromises

回复
James Slora Jr

Securing operations and information

2 年

Right on target. We have to start from where we are, and that is not always a pretty place. We still want to make the attacker's path long and difficult with lots of opportunities to get caught or disheartened before accomplishing their mission. Managing attack paths can help that happen, and keeps attention on the most important problems even when those are not newsmakers.

回复
Jagjot Singh

Associate General Manager | IT Service Delivery, End User Services

2 年

Sagar Quite a read!!!

Petra Wenham

Semiretired, Dyslexic Trans ????? female. I give trans awareness talks, 71 to date (03/2020 to 03/2025). Past skills history: InfoSec, IT Risk Analysis & Management, GDPR. #trans # awareness #diversityandinclusion

2 年

A very readable and incisive blog AMY Stokes-Waters ?? that identifies a key IT security issue that is quite often missed, overlooked or ignored “I’ve left the defaults on, so that’s OK!” In my 20 plus years in InfoSec/InfoAssurance (40 plus if you include my earlier network design and subsequent IT audit experience) it is ignoring the basics that is a major factor in causing IT security breaches. Correctly setting up (and maintaining) Active Directory, or any directory (such as X.509) that impacts or controls security in a network, is an absolutely key basic. I could go on, but your blog covers the subject very well.

回复

要查看或添加评论,请登录

?? Amy Stokes-Waters的更多文章

  • I'm Worthy, Damnit!

    I'm Worthy, Damnit!

    It’s FRIDAY! I’m a FEMINIST! And we’re back with an International Women's Day special of ? FEMINISM FRIDAY ?! This…

    5 条评论
  • Kiss and Make Up

    Kiss and Make Up

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re asking..

    14 条评论
  • Penis Portraits

    Penis Portraits

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re discussing……

    24 条评论
  • Smashing the Patriarchy is a Team Sport

    Smashing the Patriarchy is a Team Sport

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re discussing…

    23 条评论
  • I'm Not a Feminist, But...

    I'm Not a Feminist, But...

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re talking about…

    3 条评论
  • What About "P*ss Off"?!

    What About "P*ss Off"?!

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re discussing…

    19 条评论
  • Growing Old Disgracefully

    Growing Old Disgracefully

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re discussing the…

    3 条评论
  • Masterchef's Master Class in Misogyny

    Masterchef's Master Class in Misogyny

    It’s NOT Friday! I AM a FEMINIST! And we’re back with a mid-week edition of ? FEMINISM FRIDAY ?! This week, we’re…

    13 条评论
  • Can Women Have It All?

    Can Women Have It All?

    It’s FRIDAY! I’m a FEMINIST! And we’re back with a new edition of ? FEMINISM FRIDAY ?! This week, we’re discussing…

    6 条评论
  • Fe-MEN-ism Friday

    Fe-MEN-ism Friday

    It's FRIDAY! I'm a FEMINIST! And it's been a while since I've said the words but we're back with another ? FEMINISM…

    5 条评论

社区洞察

其他会员也浏览了