Security resilience: Exploring windows domain-level defenses against post-exploitation authentication attacks

Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Passthe- Ticket, two prominent post-exploitation, credential theft attacks. An operating system's security resilience consists of its native features that allow for containing a detected attack. Postexploitation refers to an attacker's activities subsequent to penetration. Specifically, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing its use by attackers. After triggered, the user is forced to contact the domain administrators to reauthenticate to the Domain Controller (DC) to continue. This could become the basis for a response Windows system administrators could use to halt the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

Original languageEnglish
Title of host publicationProceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016
PublisherAssociation for Computing Machinery, Inc
ISBN (Electronic)9781450337526
DOIs
StatePublished - Apr 5 2016
Event11th Annual Cyber and Information Security Research Conference, CISRC 2016 - Oak Ridge, United States
Duration: Apr 5 2016Apr 7 2016

Publication series

NameProceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016

Conference

Conference11th Annual Cyber and Information Security Research Conference, CISRC 2016
Country/TerritoryUnited States
CityOak Ridge
Period04/5/1604/7/16

Keywords

  • Microsoft version of kerberos protocol
  • Pass-the-hash attacks
  • Pass-the-ticket attacks
  • Windows 7 authentication
  • Windows 8.1 authentication
  • Windows server 2012 authentication

Fingerprint

Dive into the research topics of 'Security resilience: Exploring windows domain-level defenses against post-exploitation authentication attacks'. Together they form a unique fingerprint.

Cite this