Hardening Microsoft Environments
This is a two-day training. It takes place online on March 17 and 18, 2021.
Credential theft attacks can be described as a technique in which account logon credentials are captured from a compromised computer, and then used to authenticate to other systems on the network. Attack techniques which fall in the categories of “Credential Theft” or “Credential Reuse” have grown in the last few years into one of the biggest threats to Microsoft Windows environments.
In 2015 and 2016, this development was significantly promoted by a considerable improvement and increasing distribution of hacking and attack tools, such as mimikatz and Windows Credential Editor and frameworks for attacking Active Directory environments such as PowerSploit or Empire. This led to theoretical attacks being actually possible in real world scenarios with the application of the aforementioned methods. Once an attacker gains initial foothold on a single system in the environment it takes often less than 48 hours until the entire Active Directory infrastructure is compromised.
But how can such a threat be handled?
In this intensive two-day seminar we will present various technical and organizational measures to protect both individual critical Microsoft Windows systems, as well as the entire Active Directory. The goals in mind are to prevent credential theft in the first place, but also to protect against and detect unauthorized use of stolen credentials as early as possible and to provide important hardening guideline information.
Day 1
-
Introduction
-
Relevancy and actuality of Credential Theft und Credential Reuse
-
Windows Authentication
-
Basics of Windows Authentication
-
Security Subsystem Architecture in Windows
-
Local Security Authority Subsystem Service
-
Local authentication
-
LM/NTLM network authentication
-
Kerberos network authentication
-
Credential Theft & Reuse Attacks
-
Introduction into mimikatz
-
Pass-the-Hash
-
Pass-the-Ticket
-
Overpass-the-Hash/Pass-the-Key
-
Golden & Silver Ticket, Inter-Realm Ticket
-
PtT in Ubuntu and Mac OS X
-
Practical Exercises for All Mentioned Attack Techniques
-
First Overview of Relevant Measures to Reduce Risk
-
Reorganization of the Active Directory structure and best practice for administration
-
Technical and Credential-Theft-specific measures
-
Security monitoring & logging
Day 2
-
Detailed Examination of Relevant Measures to Reduce Risks
-
Requirements
-
Organizational and design measures (Admin Tiering, ESAE Forest)
-
Technical measures
-
Secure administration hosts
-
Secure configuration of domain controllers and members
-
Credential-Theft-specific measures
-
Active Directory Monitoring
-
Overview of Windows Event Logging
-
General monitoring measures
-
Centralized logging
-
Basics of Advanced Audit Policy
-
Specific monitoring measures
-
Detection of PtH, PtT and Golden Tickets
Who should attend this training?
-
IT Security Officers
-
Windows & Active Directory Administrators
-
Project Managers with security focus
-
Infrastructure and system architects
-
System integrators
-
Head of IT & Data Protection Supervisors
Prerequisites
- Basic knowledge of Active Directory environments and Windows systems.
Requirements
-
A stable, wired Internet connection (preferably without a VPN connection)
-
An up-to-date browser with HTML5 support (preferably Google Chrome)
-
Deactivation of browser plugins that may block content from the training platform
-
WebRTC support in the browser and the network configuration
-
Optional: a working microphone and webcam