Helpdesk
IT System Analyst
System Administrator
Security Analyst
DFIR
Technical Product Manager
Security Research Engineer
Security Solution Architect
Machine/User specific settings
Free-for-all
Unmanaged
Location based
Subnet based
Even down to your refrigerator
Act As Part of the Operating System
Create a Token Object
Debug Programs
Impersonate a Client After Authentication
Load and Unload Device Drivers
Restore Files and Directories
Take Ownership
SeImpersonatePrivilege
SeCreateGlobalPrivilege
Grants read/write access to user & kernel-mode memory
Malware uses it for:
New thread injected into any process
Passwords, hashes, encryption keys and other data can be read out of kernel space memory without DLL injection.
Pass-The-Hash Attacks
Once malware has your password hash they can:
Extract password hashes of local accounts
Extract password hashes of interactive users with AD accounts
Plus others
SeDebugPrivilege
Local Service
Virtual Service Account
Network Service
Local User Account (non-Admin)
Group Managed Service Account (domain user)
Domain User
Local System
Local User (local admin)
Global User (local admin
Global User (domain admin)
Global User (Enterprise Admin)
Hint: If you are attempting to communicate over the network, try Network Service first!
Text
IF YOU CAN:
EXEs, DLLs, Scripts, MSIs, APPXs
Three different conditions can be use
BLOCK rules always trump ALLOW rules
Every file has a unique hash value
Positive
Unique hash for every executable
Secure!
Negative
Every update has a new hash
email: rickardja@live.com
blog: https://letsautomate.it
twitter: @MSAdministrator
github: https://github.com/MSAdministrator
slides:
https://letsautomate.it/presentations/securing-windows-with-group-policy.html