Hardening Microsoft Environments

Online Training date: October 19-20, 2021.

Abstract

Credential theft attacks can be described as a technique in which account logon credentials are captured from a compromised computer, and then used to authenticate to other systems on the network. Attack techniques which fall in the categories of “Credential Theft” or “Credential Reuse” have grown in the last few years into one of the biggest threats to Microsoft Windows environments.

Since 2016, this development was significantly promoted by a considerable improvement and increasing distribution of hacking and attack tools, such as mimikatz and Windows Credential Editor and frameworks for attacking Active Directory environments such as PowerSploit or Empire. This led to theoretical attacks being actually possible in real world scenarios with the application of the aforementioned methods. Once an attacker gains initial foothold on a single system in the environment it takes often less than 48 hours until the entire Active Directory infrastructure is compromised.

But how can such a threat be handled?

In this intensive two-day seminar we will present various technical and organizational measures to protect both individual critical Microsoft Windows systems, as well as the entire Active Directory. The goals in mind are to prevent credential theft in the first place, but also to protect against and detect unauthorized use of stolen credentials as early as possible and to provide important hardening guideline information.

Description

Day 1

  • Introduction
  • Relevancy and actuality of Credential Theft und Credential Reuse
  • Windows Authentication
  • Basics of Windows Authentication
  • Security Subsystem Architecture in Windows
  • Local Security Authority Subsystem Service
  • Local authentication
  • LM/NTLM network authentication
  • Kerberos network authentication
  • Credential Theft & Reuse Attacks
  • Introduction into mimikatz
  • Pass-the-Hash
  • Pass-the-Ticket
  • Overpass-the-Hash/Pass-the-Key
  • Golden & Silver Ticket, Inter-Realm Ticket
  • PtT in Ubuntu and Mac OS X
  • Practical Exercises for All Mentioned Attack Techniques
  • First Overview of Relevant Measures to Reduce Risk
  • Reorganization of the Active Directory structure and best practice for administration
  • Technical and Credential-Theft-specific measures
  • Security monitoring & logging

Day 2

  • Detailed Examination of Relevant Measures to Reduce Risks
  • Requirements
  • Organizational and design measures (Admin Tiering, ESAE Forest)
  • Technical measures
  • Secure administration hosts
  • Secure configuration of domain controllers and members
  • Credential-Theft-specific measures
  • Active Directory Monitoring
  • Overview of Windows Event Logging
  • General monitoring measures
  • Centralized logging
  • Basics of Advanced Audit Policy
  • Specific monitoring measures
  • Detection of PtH, PtT and Golden Tickets

Who should attend this training?

  • IT Security Officers
  • Windows & Active Directory Administrators
  • Project Managers with security focus
  • Infrastructure and system architects
  • System integrators
  • Head of IT & Data Protection Supervisors

Requirements

  • Basic knowledge of Active Directory environments and Windows systems.
  • You will need to have your own Laptop and you will need to be able to establish a https connection to the workshop’s AD Lab environment in order to perform the workshop’s exercises.

About the Speakers