Module 11 Flashcards

(53 cards)

1
Q

What is the MITRE ATT&CK Tactic ID and name for ‘User Impersonation’?

A

T1550, Use Alternate Authentication Material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary purpose of the ‘User Impersonation’ tactic in the adversary lifecycle?

A

To leverage credential material obtained during Credential Access to assume the identity of another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a user successfully authenticates to a Windows system, the authentication package creates a new _____ for that user.

A

logon session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What unique identifier is associated with a Windows logon session?

A

A Logon Identifier, or LUID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What entity in Windows creates an access token for a user after a successful logon?

A

The Local Security Authority (LSA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An access token contains security information associated with a _____, such as the user’s SID and group memberships.

A

logon session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two types of access tokens mentioned in the source material?

A

Primary and impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of access token is assigned to every process that starts within a logon session?

A

A primary access token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Windows, what object is checked when making access-based decisions for actions performed against securable objects?

A

The process’s access token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A thread within a process can use an _____ token to carry out actions under a different identity than the main process.

A

impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The information returned by the whoami command is generally taken from what part of the process?

A

The primary access token of the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What Windows process stores credentials like plaintext, NTLM/AES hashes, and Kerberos tickets in memory for active logon sessions?

A

LSASS (Local Security Authority Subsystem Service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term for the technique where an adversary impersonates an access token belonging to another user?

A

Token Impersonation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In ‘Token Impersonation,’ what is the ‘Make Token’ technique?

A

An adversary uses the plaintext credentials of a user to create a new access token and then impersonates it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What two Windows APIs are typically used in the ‘Make Token’ technique?

A

LogonUserA and ImpersonateLoggedOnUser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the Beacon command to create and impersonate a new token using plaintext credentials?

A

make_token [DOMAIN\user] [Password]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Does the ‘Make Token’ technique require a high-integrity context?

A

No, it does not require a high-integrity context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In ‘Token Impersonation,’ what is the ‘Steal Token’ technique?

A

An adversary steals the primary access token from a process running as a different user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the first step, and corresponding API, in the process of stealing a token?

A

To obtain a handle to the target process using the OpenProcess API.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

After obtaining a process handle, what is the next API call in the ‘Steal Token’ technique?

A

OpenProcessToken, to get a handle to its primary access token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the Beacon command to steal and impersonate a token from a running process, given its PID?

A

steal_token [PID]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Does the ‘Steal Token’ technique require a high-integrity session?

A

Yes, it does require a high-integrity session.

23
Q

What is the purpose of the rev2self command in Beacon?

A

It instructs Beacon to stop impersonating a token, whether it was made or stolen.

24
Q

The Beacon rev2self command is a wrapper for which Windows API call?

A

RevertToSelf.

25
What is the main downside of the `steal_token` command if the target process closes?
If impersonation is dropped and the process closes, you can no longer impersonate that token again.
26
What feature in Beacon allows an operator to permanently hold a reference to a stolen token, even after the original process has closed?
The token store.
27
What Beacon command is used to steal a token from a process (by PID) and add it to the token store?
token-store steal [PID]
28
What is the MITRE ATT&CK technique ID for 'Pass the Hash'?
T1550.002.
29
What is 'Pass the Hash' (PtH)?
A technique that allows an adversary to leverage an NTLM hash for user impersonation.
30
What underlying tool does Beacon's `pth` command use?
Mimikatz, specifically the 'sekurlsa::pth' module.
31
Why is Pass the Hash becoming a more anomalous and less reliable technique?
Kerberos has replaced NTLM as the default authentication protocol, and NTLM may be restricted in hardened environments.
32
What is the syntax for Beacon's built-in Pass-the-Hash command?
pth [DOMAIN\user] [hash]
33
What is the MITRE ATT&CK technique ID for 'Pass the Ticket'?
T1550.003.
34
What is 'Pass the Ticket' (PtT)?
A technique that allows an adversary to leverage stolen, forged, or requested Kerberos tickets for user impersonation.
35
Why is Pass the Ticket considered superior to Pass the Hash?
It is stealthier because Kerberos is not anomalous, and it uses native Windows APIs, so it is not prevented by PPL.
36
Besides extracting them from memory, how can an adversary legitimately obtain Kerberos tickets for a user?
By requesting them on behalf of a user if they have their NTLM hash or AES encryption keys.
37
What is the Rubeus command to request a Ticket Granting Ticket (TGT) for a user, given their AES key?
asktgt /user:[user] /domain:[domain] /aes256:[key]
38
What is the Beacon command to apply a Kerberos TGT to the current session from a file?
kerberos_ticket_use [path_to_kirbi_file]
39
On which machine must the `.kirbi` file exist when using Beacon's `kerberos_ticket_use` command?
On the computer running the Cobalt Strike client.
40
What is the negative consequence of injecting a TGT for one user into a logon session already belonging to another active user?
It will overwrite or 'clobber' the original user's TGT, potentially impacting their access to domain services.
41
What is the optimal strategy to avoid 'clobbering' tickets when performing a Pass-the-Ticket attack?
Create a new logon session, impersonate it, and then inject the Kerberos ticket into that new session.
42
What Beacon command can create a new logon session (netonly) for the purpose of injecting a Kerberos ticket?
make_token [DOMAIN\user] [FakePassword]
43
What is the purpose of the `kerberos_ticket_purge` command in Beacon?
To remove all Kerberos tickets from the current session without disposing of the session itself.
44
What is a limitation of Beacon's built-in `kerberos_ticket_use` command regarding ticket types?
It will only inject Ticket Granting Tickets (TGTs) and not service tickets.
45
What Rubeus command can inject both TGTs and service tickets, and can accept base64 encoded tickets directly?
The `ptt` command.
46
What is the syntax for Rubeus's `ptt` command when targeting a specific logon session LUID?
ptt /luid:[luid] /ticket:[ticket]
47
What Rubeus command can be used to spawn a hidden process in a new logon session, returning its PID and LUID?
createnetonly
48
After using Rubeus's `createnetonly` and `ptt` commands, what is the final step to utilize the injected ticket?
Steal the token of the spawned process (e.g., using `steal_token [PID]`).
49
After a successful Pass-the-Ticket or Pass-the-Hash, why might the `getuid` command still show the original user's name?
Because the username returned is taken from the primary access token of the process, not from the alternate credential material in the logon session.
50
What is the MITRE ATT&CK technique ID for 'Process Injection'?
T1055.
51
How can process injection be used as a user impersonation technique?
By injecting shellcode into a process a target user is running, the new session runs under the security context of that user.
52
What is the Beacon command to inject shellcode for a given listener into a target process?
inject [PID] [architecture] [listener_name]
53
What privilege level is required to inject shellcode into processes other than your own?
A high-integrity session is required.