当前位置:网站首页>Internal network security attack and defense: a practical guide to penetration testing (VII): cross domain attack analysis and defense
Internal network security attack and defense: a practical guide to penetration testing (VII): cross domain attack analysis and defense
2022-04-23 07:56:00 【Fish in Siyuan Lake】
Catalog
Preface
Continue reading and learning this article 《 Intranet security attack and defense : Penetration test practice guide 》, This chapter is about cross domain attack analysis and defense , This paper analyzes the typical methods of cross domain attack using domain trust relationship , It also gives some suggestions on how to deploy a secure intranet production environment , The content is very brief
Large enterprises generally share resources through domain forests
- Departments divided according to different functions , Logically, it is divided into main domain and sub domain , To facilitate unified management
- At the physical level , Firewalls are usually used to divide subsidiaries and departments into different areas
- If the attacker gets the domain controller of a subsidiary or department , But I didn't get all the permissions of the intranet of the whole company ( Or the required resources are not in this domain ), Often find ways to get other departments ( Or domain ) Authority
One 、 Cross domain attack methods
Common cross domain attack methods are :
- Conventional penetration methods ( For example, using Web Vulnerability cross domain access )
- Hash delivery attack or ticket delivery attack using known domain hash value ( for example DC Your local administrator password is the same )
- Cross domain attacks using domain trust relationships
Two 、 Cross domain attack using domain trust relationship
1、 Introduction to domain trust
The role of domain trust is to solve the problem of cross domain resource sharing in multi domain environment
- By default , given Windows All users in the domain can be authenticated through the resources in the domain
- The domain environment will not unconditionally accept credentials from other domains , If the user wants to access resources outside the current domain boundary , Domain trust is required
- Domain trust is a mechanism of domain , Allow users in another domain to access resources in this domain after authentication
- from Windows server 2003 Start , The domain trust relationship becomes bidirectional , And can be transmitted through trust relationship
- Only Domain Admins Users in a group can manage domain trust relationships
2、 Get domain information
In the domain ,Enterprise Admins Group ( Only in the root domain of the forest ) Members of have full control over all domains in the forest . By default , This group contains all domain controllers in the forest that have Administrator Members of the authority
Use LG.exe This tool , Information that can be used to enumerate remote host users and groups
// Enumerate user groups in a domain
lg.exe <domain name>\.
// Enumerate the local group users of the remote machine
lg.exe \\dc
// Get all remote users in SID
lg.exe \\dc -lu -sidsout
// Gets the name of all members in the specified group SID
lg.exe \\dc\administrators -sidsout
3、 Use the domain trust key (NTLM Hash) Get permissions for the target domain
utilize mimikatz Export the trust secret key and forge the trust ticket ( have sidHistory)、 utilize asktgs request TGS、 utilize kirbikator take TGS Information is injected into memory , Get permissions for the target domain .
Use mimikatz You can set... When building gold notes sidHistory, therefore , If the attacker obtains the... Of any domain krbtgt Hash value , You can use it sidHistory Get full permissions for the forest .
4、 utilize krbtgt The hash value gets the permissions of the target domain
stay DC Upper use mimikatz obtain krbtgt Hash value 、 Use ordinary user permissions to construct and inject gold notes in the sub domain , Get permissions for the target domain
5、 Leverage unrestricted delegation and MS-RPRN Get trust permissions
If the attacker has obtained the permission of a domain controller in the domain forest or configured the permission of any server with unrestricted delegation
jurisdiction , You can use MS-RPRN Make the domain controller of the trust forest send authentication request to the server that has been controlled , Use the captured ticket to obtain the hash value of any user in the trust forest
Two tools :
- Rubeus Monitor authentication requests :https://github.com/GhostPack/Rubeus
- SpoolSample Send authentication request :https://github.com/leechristensen/SpoolSample
3、 ... and 、 Prevent cross domain attacks
Extranet Web Often configure WAF And regular safety inspection by maintenance personnel , And Intranet Web( Internal office 、 Test server, etc ) More vulnerable , There are often weak passwords and vulnerabilities that are not patched in time
In many companies , Although different domains are divided for different departments , But domain administrators may be the same people , Therefore, the user name and password of the domain administrator may be the same
Therefore, it is important to check DC Whether the local administrator password of is the same as that of other domains DC The local administrator password is the same
Conclusion
This chapter is brief , It mainly uses domain trust relationship to realize cross domain attack
版权声明
本文为[Fish in Siyuan Lake]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230628265116.html
边栏推荐
- Unity获取真实地理地图应用Terrain笔记
- 关于unity获取真实地理地图转3D化的相关链接
- Read and modify the JSON file under the resource folder
- 《内网安全攻防:渗透测试实战指南》读书笔记(六):域控制器安全
- Unity gets a resource that is referenced by those resources
- Houdini fluid > > particle fluid export to unity note
- Shapley Explanation Networks
- 常用Markdown语法学习
- 事件系统(二)多播事件
- RGB color to hex and unit conversion
猜你喜欢

使用flask时代码无报错自动结束,无法保持连接,访问不了url。

SAP自建表log功能开启
![[NLP notes] preliminary study on CRF principle](/img/8c/2717aeee2e75bdae97d2bacd362e53.png)
[NLP notes] preliminary study on CRF principle

命令行参数传递库argparse的使用

内网渗透系列:内网隧道之icmpsh

內網滲透系列:內網隧道之icmpsh

FUEL: Fast UAV Exploration using Incremental Frontier Structure and Hierarchical Planning

SAP GUI安全性
![MySQL8. 0 installation / uninstallation tutorial [window10 version]](/img/9c/1acf153b410f0d2eb6a23dcdbabb88.png)
MySQL8. 0 installation / uninstallation tutorial [window10 version]

SAP TR手动导入系统操作手册
随机推荐
Zhuang understand's TA notes (VI) < fakeenvreflect & rust, rust effect >
SampleCameraFilter
庄懂的TA笔记(七)<Lambert+Phong+Shadow+3EvColor+AO>
Unity ugui determines the solution of clicking on the UI and 3D objects
TimelineWindow
C SVG path parser of xamarin version
Idea shortcut
03Scanner类的使用(控制台输入)
05数组的使用
IDEA快捷键
索引被锁数据无法写入ES问题处理
NodeJS(四) 字符读取
Houdini>建筑道路可变,学习过程笔记
Unity gets a resource that is referenced by those resources
Apache Hudi 如何加速传统的批处理模式?
FUEL: Fast UAV Exploration using Incremental Frontier Structure and Hierarchical Planning
TA notes of Zhuang understand (VII) < Lambert + Phong + shadow + 3evcolor + Ao >
庄懂的TA笔记(六)<FakeEnvReflect && 生锈,锈迹效果>
Automatically fit single line text into the target rectangle
双面显示的shader