Click here to load reader

So You Think Your Domain Controller Is Secure?

  • View

  • Download

Embed Size (px)


So You Think Your Domain Controller Is Secure?. Justin Hendricks Security Engineer Twitter - @ Script_happens. Introduction. Presentation covers basic domain controller isolation principles. - PowerPoint PPT Presentation

Text of So You Think Your Domain Controller Is Secure?

So You Think Your Domain Controller Is Secure

So You Think Your Domain Controller Is Secure?Justin HendricksSecurity EngineerTwitter - @Script_happensIntroductionPresentation covers basic domain controller isolation principles.Recommendations for securely configuring software used to manage domain controllers (SCOM, HP iLO, and Hyper-V).No vulnerabilities are discussed.Only demonstrations on how features could be abused if not configured properly.BackgroundDomain ControllersHandle authentication of domain accounts in Windows.Stores password hashes for all domain accounts.The crown jewels of the domain.Recommendations for securing domains focus on pass-the-hash and account segmentationSoftware used to manage DCs is often overlooked.

BackgroundSystem Center Operations Manager (SCOM)Software used to monitor server health.Great SCOM security guide available: Out-Of-Band Management DevicesUsed to monitor and manage servers over the network regardless of the server state.Guidance on securing OOB devices:

BackgroundHyper-VWindows Server Virtualization SoftwareRunning domain controllers in Hyper-V: host computer on which virtual domain controllers are running must be managed as carefully as a writeable domain controller

Monitoring SoftwareSystem Center Operations Manager (SCOM) is used for monitoring and alerting of server health.SCOM management server hosts the SCOM SDK service on port 5723 and 5724.Required to be open in order to pull data across environment boundaries. Firewalls often configured to allow these ports.Default NMap scan does not check these ports.SCOM agent which runs on monitored servers typically runs as SYSTEM.Abusing FunctionalitySCOM tasks allow you to run VBScript on monitored servers.Any account in the SCOM Administrators or Authors roles can run VBScript on any monitored server.Code runs under the SCOM agent which is configured to run as SYSTEM by default.SCOM servers that monitor domain controllers should be treated as domain controllers.

SCOM SDK Architecture

Default SCOM Agent Credentials

Security WarningsMany existing articles warn users of the dangers of running tasks under high-privileged accounts: this example we will create very generic agent task. You can use this task to execute any command on any windows computer. Be careful with the distribution of this task as it is very dangerous but also very powerful! default account for the Run As profile is the action account. Give appropriate thought to what the action account should be and choose an account with appropriate permissions. In most instances, a domain administrator would not be a good choice. this way you should take care of what tasks to allow operators to be able to run the default behavior is possible elevation of their privileges to be able to execute a task running under a pre-defined credential such as local system, or a SQL run-As account.

DemoCreating SCOM tasks to run arbitrary code.RecommendationsSegregate SCOM servers used to monitor domain controllers.Close off SCOM SDK ports (5723 and 5724).Reduce SCOM Administrators and Authors roles to only domain admins.Move support and engineers to Read-Only or Operator SCOM roles.Reduce SCOM agent privileges.Follow the official SCOM security guide: and EvasionSCOM tasks should be audited to detect hidden malicious tasks.SCOM stores task execution logs in the SCOM database.Default retention is 7 days, but can be changed.SCOM SDK connections logged in Operations Manager event log.SCOM Task History

Out-Of-Band Management DevicesServers usually have OOB management hardware used for server monitoring and maintenance.HP Integrated Lights Out (iLO), Dell DRAC, IBM Integrated Management Module (IMM), etcEquivalent to physical access to a server.Admin interface accessed over HTTP/HTTPS, SSH, IPMI.Commonly have default passwords set.Remote Root Vulnerabilities: to patch.HP ILO Security Override Switch

OOB Device Default PasswordsOOB DeviceDefault UsernameDefault PasswordDell Remote Access Card (DRAC)rootCalvinIBM Integrated Management Module (IMM)USERIDPASSW0RDHP Integrated Lights Out (iLO)Administrator

Fujitsu Integrated Remote Management ControlleradminadminSupermicro IPMI (2.0)ADMINADMINOracle/Sun Integrated Lights Out Manager (ILOM)rootChangemeASUS iKVM BMCadminadminDemoUsing HP iLO to mount Linux live disc.RecommendationsChange default passwords.Have regular patching process for OOB devices.Monitor audit logs for unauthorized access.Configure 2FA when possibleSet up separate management VLAN for OOB devices.SANS paper on securing OOB devices:

Hyper-VWindows virtualization software that hosts virtual machines.Administrator on the host is equivalent to admin rights on all guest virtual machines.Can boot into a Linux live disc or steal the VHD file to compromise domain controller VM.Booting Into Linux Live Disc

Stealing NTDS.DIT and SYSTEM hive

RecommendationsSegregate Hyper-V servers that host domain controllers.Only domain admins should have access to:Hyper-V servers hosting domain controllers.Domain controller VHDs.Host should be in a separate management network when possible.Additional guidance:

Vulnerability ScannersOrganizations typically perform authenticated vulnerability scanning.The account used is typically very high privileged and has admin access to domain controllers.These servers should be treated as a domain controller if they use domain admin credentials.ConclusionManagement software and hardware is often highly privileged and can be abused if not properly secured.Segregate management of domain controllers from other categories of servers.Contact InfoTwitter - @Script_HappensPresentation Content will be posted on:

Search related