Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Just another week

November 9, 2018 By Michael Kavka Leave a Comment

I would love to give you all some big post this week. That is not the case as I do not have a big thing to post about. With the elections this week, and just doing some normal cleanup at work, not a whole lot is going on, so here are a few tidbits.

Brakeing Down Security started the new book in book-club this week, Hacker Playbook 3. Good first discussion and a great write-up can be found here that covers what we went over. If you want to know more, go to their website and mail them asking for admittance to the slack they run.

Vendor happy hours can be interesting. This week I was at one where they had a dog and pony show about using Blockchain as a DLP solution. The company that presented on this, being from Texas, not only catered in some good Texas BBQ, but also started their presentation with tips on making a good BBQ brisket. Why do I bring this up? If you have a product that is going to get ripped apart by the audience, at least give them something they can use.

Cisco seems to have become quite the punching bag lately. Every time I blink it seems they are announcing 2-4 new bugs in their products. Makes me wonder how many holes they have not announced yet.

That covers things for this week.

Filed Under: Security Tagged With: Blockchain, Brakeing Down Security, Cisco

DCSync, where the heck did that come from?

October 25, 2018 By Michael Kavka Leave a Comment

Have you every had a pentest or red team report that talks about DCSync? How much of it has been hair pulling? What is DCSync and what is the significance of it?

When securing Active Directory, there are a ton of moving parts, and even more rights available, especially when you add in extended rights. There is a set though, that can get assigned, which are used for synchronizing all of Active Directory. Two of them work together and allow for the copying of secret information, such as password hashes. This right is important when do certain types of sign on using AD credentials, such as Sharepoint, or synchronizing with Azure. It also allows for Domain Controllers to synchronize all the domain information between them. The rights, “Replicating Domain Changes” and “Replicating Domain Changes All”, have that much power, but to be able to get a full sync with password hashes you need both rights. The idea is to keep these rights, especially the All right, to a bare minimum of user/services accounts. This is important to prevent Mimikatz’s DCSync attack, which essentially makes a copy of all the AD information so one can crack passwords offline.

One would think this should not be a big deal, but it can get out of control very quickly. For starters, the only place that you can directly see these rights is at the root of the domain when using ADUC (Active Directory Users and Computers). Even when propagated down you cannot just see it as part of the advanced security section of the properties, to remove it. Second, you can get it by being granted full control, or part of a group that is granted full control, of a group that either has the right granted directly from the root, or from a group that already has the rights propagated down to it. You can see this sort of delegation of rights by using a tool such as BloodhoundAD to map out the relationships. Another way one can get this right is through being assigned it through delegation at the root of the domain. The end result of all of this is that, there should be little to no reason for normal, or even admin users to have the Replicating Domain Changes All right. Certain services account that are not allowed interactive logon may need it, such as a service account to replicate to Azure as mentioned before. Bottom line, this right should not be given out unless absolutely necessary.

So we have a tool in BloodhoundAD that can show us what accounts and groups have this right. It shows if they are getting it through a security assignment such as Full Control, or if it is because of being a member of a group with the right. The fear on removing the right is knowing if it will break anything. How do we know what accounts are actually using said right? Windows Logs come in handy on this instance, as long as you are getting them from Domain Controllers.

Finding the search string happened for me while learning about information I was getting from a search I found in the Blue Team Field Manual, which gives some nice searches using Powershell for event logs. The one that started everything for me was their Domain Service Access – Audit Directory Service Access. More specifically, Event ID 4662is the one to search for. From there, I started looking at what Access Masks meant what, finding that Access Mask 0x100  is the Control Access property. The actual rights that it uses are given in GUID format. Some searching on the GUIDs gave me the following that relate to the extended rights “Replicating Directory Changes” GUID:{19195a5b\-6da0\-11d0\-afd3\-00c04fd930c9\}  and “Replicating Directory Changes All” GUID:{1131f6aa\-9c07\-11d1\-f79f\-00c04fc2dcd2} . The big thing is that it shows Computer Accounts, such as Domain Controllers, using the rights to synchronize between themselves, and any user accounts that are actually using the rights, such as an Azure service account, that is using it. Filtering out the computer accounts will show what accounts are actually doing any synchronization. This allows for one to ask account owners why they might be synchronizing the domain with said account. Through that, one can easily get a good idea of what will happen if the Replicating Directory Changes All right is removed, and reassign accounts that actually need the right to have it directly from the root of the domain, thereby allowing removal the right from groups also. In Graylog the search if you are using NXLog into a GELF input to parse the Event Log information properly the search would like like this:

EventID:4662 AND AccessMask:0x100 AND ObjectType:"%\{19195a5b\-6da0\-11d0\-afd3\-00c04fd930c9\}" AND "{1131f6aa\-9c07\-11d1\-f79f\-00c04fc2dcd2}" AND NOT SubjectUserName:*$

Mind you that using *$ requires in Graylog that you have configured Graylog to accept wildcards as the start of a search string. If that is not configured you should be able to put the first character of your naming scheme then the wildcard and $. In Splunk the search would be similar, making sure you use the proper index and field name for EventIDs in Splunk.

This gives a basic way to search for an attacker attempting to make a copy of the domain. You could potentially remove the GUID for Replicating Domain Changes ALL from the search and see anyone trying to copy all the non-secret information from the domain, again a way for attachers to do searches through the domain offline, and thereby making less noise.

As always, if I have made any errors in this, feel free to let me know, and feel free to discuss all of this

Filed Under: General Tagged With: Blue Team, DCSync, Graylog, Replicating Directory Changes, Replicating Directory Changes All, SIEM

Post Derbycon Wrapup

October 12, 2018 By Michael Kavka Leave a Comment

I went to my first Derbycon last weekend, and what a time it was. Yes Lobbycon is pretty cool. Yes the entertainment was a blast. The talks were all top rate (after seeing them, I am glad I my talk got turned down). I recommend checking out Derbycon if you can, and even if you do not have a ticket, go anyway. There winds up being last minute tickets available if you watch the Slack channel for Derby.

The fun for me with a con though, is finding things I can start working on in the environment I have. Derby had a great talk by Michael Gough on WMI Detection, that I am going over again so I can implement some of it. Actionable items like these are fantastic, and with certain things going on right now, should be rather helpful.

The name of the game on anything though is what impact good and bad will such things have on one’s environment. The second question is about the maturity level of your environment, not just technology wise, but resource wise. If you do not have the resources to maintain things, then you cannot do them, no matter how automated it might be. Otherwise all you have done is set up a system that won’t get used and has the potential to be a security hole as it is not maintained.

There are tons of great ideas, theories and thoughts out there, and more pop up every day. Just make sure you are not overspreading yourself.

Filed Under: Reviews, Security Tagged With: Derbycon, Michael Gough

  • « Previous Page
  • 1
  • …
  • 7
  • 8
  • 9
  • 10
  • 11
  • …
  • 248
  • Next Page »

RSS Taggart Institute Intel Feed

  • 'House of Dynamite' Is About the Zoom Call that Ends the World October 27, 2025 Matthew Gault
  • Windows will soon prompt for memory scans after BSOD crashes October 27, 2025 Sergiu Gatlan
  • GCP-2025-062 October 27, 2025 Google Cloud Documentation
  • Italian-made spyware spotted in breaches of Russian, Belarusian systems October 27, 2025
  • Cities reverse course on automated license plate reader cameras amid privacy concerns October 27, 2025
  • ‘There isn’t really another choice:’ Signal chief explains why the encrypted messenger relies on AWS October 27, 2025 Emma Roth
  • Hacking Team successor linked to malware campaign, new ‘Dante’ commercial spyware October 27, 2025 Tim Starks
  • QNAP warns of critical ASP.NET flaw in its Windows backup software October 27, 2025 Sergiu Gatlan
  • Italian spyware vendor linked to Chrome zero-day attacks October 27, 2025 Bill Toulas
  • Iran's school for cyberspies could've used a few more lessons in preventing breaches October 27, 2025 Connor Jones

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP