Lateral Movement

Enable RDP using commandline:

https://www.top-password.com/blog/enable-remote-desktop-with-registry-powershell-or-command-prompt/arrow-up-right

SCCM

Full Article : https://www.securesystems.de/blog/active-directory-spotlight-attacking-the-microsoft-configuration-manager/arrow-up-right

circle-info

Microsoft #SCCMarrow-up-right has code execution ability on #Microsoftarrow-up-right Domains Tier-0 systems (https://lnkd.in/dy5su33yarrow-up-right). Then let’s attack and … defend it. #TrustEverybodyButCutTheCardsarrow-up-right My highlights on attack phase: - #credentialharvestingarrow-up-right is everywhere: locally on SCCM clients and member servers (cached credentials and log files) and a wide set of policy and scripts variables and parameters - devastating #persistancearrow-up-right and #lateralmovementarrow-up-right technique by creating a new application and deploy it onto targeted devices managed by SCCM - tools are available for post-exploitation without requiring access to the SCCM administration console GUI (SharpSCCM https://lnkd.in/dm73J8E5arrow-up-right) My highlights on defense phase: - do not use special accounts like NAA or client push installation accounts - #WMIarrow-up-right anomalies detection is essential - SCCM itself monitoring capabilities are important: SCCM does not seem to use the Windows #EventLogarrow-up-right a lot Full article here: https://lnkd.in/dg_fu5Jdarrow-up-right Previous posts on #ActiveDirectoryarrow-up-right #cybersecurityarrow-up-right. - Defining Tier-0 assets in #ActiveDirectoryarrow-up-right and #AzureADarrow-up-right: https://lnkd.in/dy5su33yarrow-up-right - Total #Identityarrow-up-right Compromise: #DARTarrow-up-right lessons on securing AD #attackpatharrow-up-right: https://lnkd.in/dM4JDxnzarrow-up-right - “#Identityarrow-up-right is new endpoint” and “#LeastPrivilegearrow-up-right is the new #CVEarrow-up-right”. #Microsoftarrow-up-right last Cyber Signals shows it: https://lnkd.in/dJtTNDyyarrow-up-right - Beyond “#Identityarrow-up-right is new endpoint”, allow me to say “#Entitlementarrow-up-right is the new #CVEarrow-up-right”: https://lnkd.in/dsjQKkf6arrow-up-right - #ADFSarrow-up-right security: https://lnkd.in/d5YY4fyxarrow-up-right - Authentication information on #AADarrow-up-right can be gathered with #OSINTarrow-up-right #enumerationarrow-up-right: https://bit.ly/3AQLjIiarrow-up-right - Recap of #SSOarrow-up-right used with Azure AD #hybrididentitiesarrow-up-right: same link as above! - Identity-based #attackpatharrow-up-right in #ActiveDirectoryarrow-up-right: https://lnkd.in/dZyA49V8arrow-up-right - Best #guidelinearrow-up-right *ever* about #onpremisearrow-up-right and AAD architectural #hardeningarrow-up-right: https://bit.ly/3zMY9XBarrow-up-right - A #securityprogramarrow-up-right point of view: https://bit.ly/3zMN3Sjarrow-up-right (roadmap to create on-premise / Azure secure architecture) - Stories from the field about AD #attackpatharrow-up-right: https://bit.ly/3KqzHyOarrow-up-right - https://lnkd.in/e_xjzkAAarrow-up-right: #top10arrow-up-right Microsoft AD gaps in real life - https://lnkd.in/eF_BueSearrow-up-right: how to create a prioritized roadmap for AD security with #BloodHoundarrow-up-right support - https://lnkd.in/dAZm-Jdcarrow-up-right: ImproHound to identify the attack paths in BloodHound breaking your AD tiering - https://lnkd.in/dm8FACUVarrow-up-right: BloodHound to detect critical AD config errors - https://lnkd.in/duCJ2hwWarrow-up-right: BloodHound for #MicrosoftWindowsarrow-up-right Domain hardening - https://lnkd.in/dhJVkKx9arrow-up-right: Attackers think in graphs and BloodHound too - https://lnkd.in/ddBBz7jiarrow-up-right: BloodHound for #huntingarrow-up-right vulnerabilities and #securityarrow-up-right misconfigurations in AD - Practice usual #attackarrow-up-right techniques on a a vulnerable AD environement with GOAD (Game Of D>): https://bit.ly/3ToiPgbarrow-up-right Content Credit: Francesco Faenzi

Reference:

Last updated