当前位置:网站首页>Internal network security attack and defense: a practical guide to penetration testing (VII): cross domain attack analysis and defense
Internal network security attack and defense: a practical guide to penetration testing (VII): cross domain attack analysis and defense
2022-04-23 07:56:00 【Fish in Siyuan Lake】
Catalog
Preface
Continue reading and learning this article 《 Intranet security attack and defense : Penetration test practice guide 》, This chapter is about cross domain attack analysis and defense , This paper analyzes the typical methods of cross domain attack using domain trust relationship , It also gives some suggestions on how to deploy a secure intranet production environment , The content is very brief
Large enterprises generally share resources through domain forests
- Departments divided according to different functions , Logically, it is divided into main domain and sub domain , To facilitate unified management
- At the physical level , Firewalls are usually used to divide subsidiaries and departments into different areas
- If the attacker gets the domain controller of a subsidiary or department , But I didn't get all the permissions of the intranet of the whole company ( Or the required resources are not in this domain ), Often find ways to get other departments ( Or domain ) Authority
One 、 Cross domain attack methods
Common cross domain attack methods are :
- Conventional penetration methods ( For example, using Web Vulnerability cross domain access )
- Hash delivery attack or ticket delivery attack using known domain hash value ( for example DC Your local administrator password is the same )
- Cross domain attacks using domain trust relationships
Two 、 Cross domain attack using domain trust relationship
1、 Introduction to domain trust
The role of domain trust is to solve the problem of cross domain resource sharing in multi domain environment
- By default , given Windows All users in the domain can be authenticated through the resources in the domain
- The domain environment will not unconditionally accept credentials from other domains , If the user wants to access resources outside the current domain boundary , Domain trust is required
- Domain trust is a mechanism of domain , Allow users in another domain to access resources in this domain after authentication
- from Windows server 2003 Start , The domain trust relationship becomes bidirectional , And can be transmitted through trust relationship
- Only Domain Admins Users in a group can manage domain trust relationships
2、 Get domain information
In the domain ,Enterprise Admins Group ( Only in the root domain of the forest ) Members of have full control over all domains in the forest . By default , This group contains all domain controllers in the forest that have Administrator Members of the authority
Use LG.exe This tool , Information that can be used to enumerate remote host users and groups
// Enumerate user groups in a domain
lg.exe <domain name>\.
// Enumerate the local group users of the remote machine
lg.exe \\dc
// Get all remote users in SID
lg.exe \\dc -lu -sidsout
// Gets the name of all members in the specified group SID
lg.exe \\dc\administrators -sidsout
3、 Use the domain trust key (NTLM Hash) Get permissions for the target domain
utilize mimikatz Export the trust secret key and forge the trust ticket ( have sidHistory)、 utilize asktgs request TGS、 utilize kirbikator take TGS Information is injected into memory , Get permissions for the target domain .
Use mimikatz You can set... When building gold notes sidHistory, therefore , If the attacker obtains the... Of any domain krbtgt Hash value , You can use it sidHistory Get full permissions for the forest .
4、 utilize krbtgt The hash value gets the permissions of the target domain
stay DC Upper use mimikatz obtain krbtgt Hash value 、 Use ordinary user permissions to construct and inject gold notes in the sub domain , Get permissions for the target domain
5、 Leverage unrestricted delegation and MS-RPRN Get trust permissions
If the attacker has obtained the permission of a domain controller in the domain forest or configured the permission of any server with unrestricted delegation
jurisdiction , You can use MS-RPRN Make the domain controller of the trust forest send authentication request to the server that has been controlled , Use the captured ticket to obtain the hash value of any user in the trust forest
Two tools :
- Rubeus Monitor authentication requests :https://github.com/GhostPack/Rubeus
- SpoolSample Send authentication request :https://github.com/leechristensen/SpoolSample
3、 ... and 、 Prevent cross domain attacks
Extranet Web Often configure WAF And regular safety inspection by maintenance personnel , And Intranet Web( Internal office 、 Test server, etc ) More vulnerable , There are often weak passwords and vulnerabilities that are not patched in time
In many companies , Although different domains are divided for different departments , But domain administrators may be the same people , Therefore, the user name and password of the domain administrator may be the same
Therefore, it is important to check DC Whether the local administrator password of is the same as that of other domains DC The local administrator password is the same
Conclusion
This chapter is brief , It mainly uses domain trust relationship to realize cross domain attack
版权声明
本文为[Fish in Siyuan Lake]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230628265116.html
边栏推荐
- Mongodb 启动警告信息处理
- Weblux file upload and download
- 事件管理之一
- C#控制相机,旋转,拖拽观察脚本(类似Scenes观察方式)
- Houdini>流体,刚体导出学习过程笔记
- NodeJS(一) 事件驱动编程
- C problem of marking the position of polygons surrounded by multiple rectangles
- Teach-Repeat-Replan: A Complete and Robust System for Aggressive Flight in Complex Environments
- 索引被锁数据无法写入ES问题处理
- Zhuang understand's TA notes (VI) < fakeenvreflect & rust, rust effect >
猜你喜欢
FUEL: Fast UAV Exploration using Incremental Frontier Structure and Hierarchical Planning
Teach-Repeat-Replan: A Complete and Robust System for Aggressive Flight in Complex Environments
Online Safe Trajectory Generation For Quadrotors Using Fast Marching Method and Bernstein Basis Poly
Protobuf use
庄懂的TA笔记(六)<FakeEnvReflect && 生锈,锈迹效果>
Houdini > fluid, rigid body export, learning process notes
常用Markdown语法学习
内网渗透系列:内网隧道之icmpsh
第五章 投资性房地产
Export all SVG files in the specified path into pictures in PNG format (thumbnail or original size)
随机推荐
Houdini terrain and fluid solution (simulated debris flow)
Houdini > variable building roads, learning process notes
Unable to process jar entry [module info. Class]
STO With Billing 跨公司库存转储退货
使用flask时代码无报错自动结束,无法保持连接,访问不了url。
Post of experience in preparation for guarantee and research -- the 18th (2021) Central South planning department promoted the exemption to Zhejiang University Institute of Technology
Scrapy 修改爬虫结束时统计数据中的时间为当前系统时间
[unity VFX] Introduction notes of VFX special effects - spark production
NodeJS(一) 事件驱动编程
Houdini > fluid, rigid body export, learning process notes
《内网安全攻防:渗透测试实战指南》读书笔记(七):跨域攻击分析及防御
How to present your digital portfolio: suggestions from creative recruiters
一些靶场的学习记录:sqli-labs、upload-labs、XSS
常用Markdown语法学习
Understanding the role of individual units in a deep neural networks
庄懂的TA笔记(零)<铺垫与学习方法>
关于unity获取真实地理地图转3D化的相关链接
《内网安全攻防:渗透测试实战指南》读书笔记(四):权限提升分析及防御
Nodejs (VI) sub process operation
unity UGUI判断点击在UI上和3D物体上的解决方案