Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

34
Using Advanced Threat Analytics To Prevent Privilege Escalation Attacks Presenter: RUSSELL SMITH

Transcript of Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Page 1: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Using Advanced Threat Analytics

To Prevent Privilege Escalation

Attacks

Presenter:

RUSSELL SMITH

Page 2: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

@smithrussell

Russell Smith

Page 3: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Russell Smith

packtpub.com

Page 4: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Are there IT staff in your organization that

are permanently assigned Domain Admin

privileges

Page 5: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

• Prevent unwanted system-wide changes (system integrity/stability)

• AV, application control, and Group Policy can easily be evaded

• Domain admins have full access to domain controllers

• Regulatory compliance

Why Remove Admin Privileges?

Page 6: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Unpatched privilege escalation

vulnerabilities

Zero-day vulnerabilities

Remaining/temporary admin

users

But There Are Still Risks…

Page 7: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Image Credit: Microsoft

What is Microsoft Advanced Threat

Analytics?

Page 8: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Reconnaissance

Lateralmovement

cycle

Domain dominance (persistence)

Cyber-Attack Kill Chain

Page 9: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

ATA Architecture

Image Credit: Microsoft

Page 10: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

• Monitors domain controllers and DNS servers (DCs)

• Port mirroring

• Lightweight gateway for DCs available

• ATA Center and Gateway

ATA Architecture

Page 11: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

SMB enumeration

NET USER and GROUP

queries

DNS zone transfer

Reconnaissance

Page 12: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

• Pass-the-Ticket (PtT)

• Pass-the-Hash (PtH)

• Overpass-the-Hash

Lateral Movement

Page 13: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Malicious replications

Reconnaissance

Brute ForceRemote

execution

Other Attack Methods

Page 14: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Anomalous logins

Unknown threats

Password sharing

Lateral movement

Behavioural Analysis And

Machine Learning

Page 15: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Broken trustsWeak

protocols

Known protocol

vulnerabilities

Security Risks and Issues

Page 16: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Privilege Escalation

Image Credit: Microsoft

Page 17: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Reconnaissance

Image Credit: Microsoft

Gather information

Page 18: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Reconnaissance

Image Credit: Microsoft

Page 19: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Reconnaissance

Image Credit: Microsoft

Gather information

Local escalation

Harvest in-memory

credentials

Users’ location

Page 20: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Reconnaissance

Image Credit: Microsoft

Page 21: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Local Privilege Escalation

Image Credit: Microsoft

Determine permissions

Overpass-the-Hash

Page 22: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Local Privilege Escalation

Image Credit: Microsoft

Page 23: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Domain Escalation

Image Credit: Microsoft

Move hacker tools

Get Kerberos

ticket

Pass-the-Ticket

Page 24: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Domain Escalation

Image Credit: Microsoft

Page 25: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Domain Escalation

Image Credit: Microsoft

Page 26: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Domain Dominance

Image Credit: Microsoft

Create a backdoor on

DC

Page 27: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Domain Dominance

Image Credit: Microsoft

Page 28: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

• Least Privilege Security

• Protected Users

• Just-In-Time Administration

• Defense-in-Depth

Best Practices

Page 29: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

PowerBroker for

Windows

Least Privilege and Application Control

for Windows Servers and Desktops

Page 30: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Summary: Why PowerBroker for Windows?

• Asset discovery, application control, risk compliance, Windows event log monitoring included

• Optional: Session monitoring, file integrity monitoringDeep capability

• U.S. Patent (No. 8,850,549) for the methods and systems employed for controlling access to resources and privileges per process

Mature, patented leader

• Tightly integrated with vulnerability management

• Deep reporting and analytics insights for compliance and operations

Centralized reporting, analytics and management

• Privilege and session management on Unix, Linux and Windows

• Privileged password and session management

• Integrate Linux, Unix, and Mac OS X with Microsoft AD

• Real-time auditing of AD, File System, Exchange & SQL

Part of a broad solution family

Va

lida

ted

by c

usto

me

rs a

nd

an

aly

sts

alik

e

Page 31: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Your solution should:

• Elevate privileges to applications, not users, on an as-needed basis without

exposing passwords

• Enforce least-privilege access based on an application’s known vulnerabilities

• Track and control applications with known vulnerabilities or malware to further

protect endpoints

• Monitor event logs and file integrity for unauthorized changes to key files and

directories

• Capture keystrokes and screens when rules are triggered with searchable

playback

Page 32: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Product Demonstration

Page 33: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Poll

Page 34: Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks

Thank you for attending

today’s webinar!