Module 10 Flashcards

(52 cards)

1
Q

What is the primary goal of the Credential Access tactic [TA0006]?

A

An adversary attempts to steal authentication material of users, such as usernames, passwords, hashes, or Kerberos tickets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why might an adversary prefer using legitimate credentials over exploiting software vulnerabilities?

A

Leveraging legitimate credentials to access resources is often less suspicious and easier to perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The technique of stealing credentials from web browsers is tracked under which MITRE ATT&CK ID?

A

T1555.003.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do web browsers typically encrypt saved credentials on Windows?

A

They use the Windows Data Protection API (DPAPI) and store them in a local database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the typical file path structure for the SQLite database where Chromium-based browsers store login data?

A

%LOCALAPPDATA%<vendor><browser>\User Data\Default\Login Data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tool is mentioned for automatically reading and decrypting credentials from a browser’s database?

A

SharpChrome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command would you use with SharpChrome to extract saved logins?

A

execute-assembly C:\Tools\SharpDPAPI\SharpChrome\bin\Release\SharpChrome.exe logins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What integrity context is required to extract saved credentials from web browsers using a tool like SharpChrome?

A

A medium-integrity context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of credentials does the Windows Credential Manager typically store?

A

Credentials the user has asked Windows to save, such as those for Remote Desktop connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The technique of stealing credentials from the Windows Credential Manager is tracked under which MITRE ATT&CK ID?

A

T1555.004.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which native Windows utility can be used to show the presence of saved credentials in the Credential Manager?

A

vaultcmd.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the vaultcmd command to list all credentials stored under ‘Windows Credentials’?

A

vaultcmd /listcreds:”Windows Credentials” /all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the Windows Credential Manager, credential blobs are encrypted with a randomly-generated AES key, which is itself encrypted using the user’s _____.

A

master DPAPI key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool can automate the process of decrypting credentials stored in the Windows Credential Manager?

A

SharpDPAPI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the /rpc argument in the SharpDPAPI.exe credentials command?

A

It leverages the Microsoft BackupKey Remote Protocol (MS-BKRP) to ask the domain controller to decrypt the AES key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why does using the MS-BKRP protocol with SharpDPAPI work for decrypting credentials?

A

Because Domain Controllers keep a copy of the user’s master DPAPI key for emergencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OS Credential Dumping techniques, such as accessing LSASS memory or the SAM database, generally require what privilege level?

A

SYSTEM privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary responsibility of the Local Security Authority Subsystem Service (LSASS) on Windows?

A

It is responsible for verifying user credentials, handling password changes, and creating access tokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The technique of dumping credentials from LSASS memory is tracked under which MITRE ATT&CK ID?

A

T1003.001.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The Windows _____ provides different authentication mechanisms, such as NTLM and Kerberos, which are loaded by LSASS as DLLs.

A

Security Support Provider Interface (SSPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In Cobalt Strike’s implementation of Mimikatz, what does prepending a command with a ‘!’ character do?

A

It makes Mimikatz elevate to SYSTEM before running the specified command.

22
Q

What is the Mimikatz command for dumping NTLM hashes for recently authenticated users?

A

sekurlsa::logonpasswords.

23
Q

What is the corresponding Hashcat hash mode for cracking NTLM hashes?

24
Q

Besides cracking, what is another common technique for using stolen NTLM hashes?

A

Pass-the-hash.

25
What is the Mimikatz command to dump a user's Kerberos encryption keys from LSASS?
sekurlsa::ekeys.
26
Mimikatz often mislabels AES Kerberos keys. A key with a length of 64 characters is actually what hash type?
aes256-cts-hmac-sha1-96.
27
What is the definition of AS-REP Roasting?
It is a technique for obtaining the plaintext password of accounts that have Kerberos preauthentication disabled.
28
The AS-REP Roasting technique is tracked under which MITRE ATT&CK ID?
T1558.004.
29
The Rubeus command `asreproast` enumerates accounts where _____ is disabled.
Kerberos preauthentication
30
In Rubeus, what parameter is used to output hashes in a format suitable for Hashcat?
/format:hashcat.
31
What is the Hashcat mode for cracking RC4 AS-REP hashes?
Mode 18200.
32
For OPSEC, which Windows Event ID is generated for each AS-REP request, which can help detect AS-REP Roasting?
Event ID 4768.
33
From an OPSEC perspective, why is requesting RC4-encrypted tickets with a tool like Rubeus potentially suspicious?
Modern versions of Windows use AES128 and AES256, so the use of older RC4 tickets can stand out.
34
What is the definition of Kerberoasting?
It is a technique for obtaining the plaintext password of a service account associated with a Service Principal Name (SPN).
35
The Kerberoasting technique is tracked under which MITRE ATT&CK ID?
T1558.003.
36
Kerberoasting is not considered viable against services running as a computer account. Why?
Because their passwords are very long (128 characters) and are automatically rotated by Active Directory every 30 days.
37
What is the Rubeus command to enumerate and roast every non-default service account?
kerberoast.
38
What is the Hashcat mode for cracking Kerberoasting (TGS-REP) hashes?
Mode 13100.
39
For OPSEC, which Windows Event ID is generated for each TGS-REP, which can help detect Kerberoasting?
Event ID 4769.
40
What is an effective OPSEC strategy for detecting careless adversaries performing Kerberoasting?
Create dummy SPNs not backed by a legitimate service, which should never generate a TGS-REQ/REP.
41
What is a safer, more targeted approach to Kerberoasting that avoids roasting every account?
Use an enumeration tool like ADSearch to triage potential targets first, then roast them selectively.
42
What is the Rubeus command to enumerate every logon session and its associated Kerberos tickets on a machine?
triage.
43
In the output of Rubeus, how can you identify a Ticket Granting Ticket (TGT)?
The ticket's service name will be `krbtgt`.
44
What Rubeus command, with no additional parameters, will extract every single cached Kerberos ticket?
dump.
45
To extract a TGT for a specific logon session (e.g., LUID 0xd42c80) using Rubeus, what would the command be?
execute-assembly Rubeus.exe dump /luid:0xd42c80 /service:krbtgt
46
What privilege level is required to triage and dump Kerberos tickets from logon sessions other than your own?
A high-integrity session.
47
What is the major OPSEC advantage of dumping Kerberos tickets with Rubeus compared to dumping hashes from LSASS with Mimikatz?
Rubeus uses LSA APIs and does not obtain a handle to the LSASS process, avoiding detection via kernel callbacks.
48
In a Kerberos ticket's details, what does the `EndTime` field represent?
The expiry date of the ticket, which is typically 10 hours after the StartTime by default.
49
In a Kerberos ticket's details, what does the `RenewTill` field represent?
The date beyond which the ticket can no longer be renewed, typically 7 days after the StartTime by default.
50
What is the Rubeus command to view the details of a Kerberos ticket, such as its StartTime, EndTime, and RenewTill fields?
describe /ticket:
51
What is the Rubeus command to manually renew an existing TGT?
renew /ticket:
52
When a TGT is renewed, its `StartTime` and `EndTime` are updated, but what happens to the `RenewTill` time?
The `RenewTill` time remains the same as the original ticket's.