Module 15 Flashcards

(67 cards)

1
Q

What is the default domain authentication protocol in Windows since Server 2000, replacing NTLM?

A

Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What central, trusted server authenticates principals in a Kerberos system?

A

The Key Distribution Center (KDC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a Windows domain, what server role acts as the Kerberos Key Distribution Center (KDC)?

A

The domain controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three sub-components of the Key Distribution Center (KDC)?

A

A principal database, an Authentication Server (AS), and a Ticket Granting Server (TGS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Ticket Granting Ticket (TGT)?

A

A ticket provided to a principal by the Authentication Server (AS) after identity verification, used to request service tickets without re-entering a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What uniquely identifies each service instance in Kerberos?

A

A Service Principal Name (SPN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the typical format of a Service Principal Name (SPN)?

A

class/instance:port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a principal request access to a service using Kerberos after obtaining a TGT?

A

It requests a service ticket from the Ticket Granting Server (TGS) component of the KDC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is another colloquial name for a Kerberos ‘service ticket’?

A

A TGS ticket or ticket granting service ticket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Privileged Attribute Certificate (PAC)?

A

A structure attached to a Kerberos ticket containing additional information about a principal, such as group memberships and user rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the primary benefit of a service using the information within a PAC?

A

The service can determine a user’s privileges without needing to query Active Directory, which improves network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What message does a client send to the KDC to request a new TGT?

A

A Kerberos Authentication Service Request (AS-REQ).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the target service’s name when a client requests a Ticket Granting Ticket (TGT)?

A

krbtgt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most common pre-authentication mechanism used by a Kerberos client in an AS-REQ?

A

An encrypted timestamp, where the current time is encrypted with a hash derived from the principal’s password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

After a successful pre-authentication, what message does the KDC send back to the client?

A

An Authentication Service Reply (AS-REP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The part of an AS-REP message that contains a copy of the logon session key encrypted with the principal’s secret is called the _____.

A

EncASRepPart.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Kerberos attack known as AS-REP Roasting involves cracking which part of the AS-REP message?

A

The EncASRepPart, to recover the user’s plaintext password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the ‘authenticator’ included in a TGS-REQ message?

A

It proves the TGS-REQ is from the genuine principal, as it is encrypted with the logon session key that is never transmitted in the clear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

With what key does a client encrypt the ‘authenticator’ in a TGS-REQ message?

A

The principal’s current logon session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Upon receiving a TGS-REQ, what must the KDC decrypt first to recover the logon session key and validate the request?

A

The Ticket Granting Ticket (TGT), using the krbtgt account’s hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The Kerberos attack known as ‘Kerberoasting’ involves cracking which part of the TGS-REP message?

A

The EncTicketPart of the service ticket, which is encrypted with the service account’s secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What two items does a client use to access a service in the final Client/Server Authentication Exchange?

A

The service ticket and the associated service session key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The final authentication messages (AP-REQ/AP-REP) are embedded inside the underlying service protocol, facilitated by what mechanism on Windows?

A

The Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of mutual authentication in the client/server exchange?

A

It proves to the client that it is communicating with the legitimate service, as only that service can decrypt the authenticator and correctly respond.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is Kerberos 'delegation'?
A feature that allows one principal (a service) to request access to resources on behalf of another principal (a user).
26
What is the oldest and most dangerous type of Kerberos delegation?
Unconstrained Delegation.
27
How is Unconstrained Delegation enabled on a computer object's UserAccountControl attribute?
By setting the TRUSTED_FOR_DELEGATION flag.
28
What type of Kerberos ticket does a client send to a service that is configured for unconstrained delegation?
A copy of the user's Ticket Granting Ticket (TGT).
29
What is the main security risk of compromising a computer configured for unconstrained delegation?
An adversary can extract cached TGTs from memory and use them to access any service in the domain as those users.
30
What Rubeus command can be used to capture TGTs as users authenticate to a service on a compromised host?
The `monitor` command.
31
What two Kerberos extensions, introduced in Server 2003, form the basis of constrained delegation?
Service for User to Proxy (S4U2proxy) and Service for User to Self (S4U2self).
32
Which S4U extension allows a service to obtain a service ticket on behalf of a user to a *different* service?
Service for User to Proxy (S4U2proxy).
33
Which S4U extension allows a service to obtain a service ticket on behalf of a user to *itself*?
Service for User to Self (S4U2self).
34
What is the term for using S4U2self when a user authenticates to a service with a protocol other than Kerberos?
Protocol Transition.
35
Constrained delegation is configured via the _____ attribute of a computer object, which lists the SPNs it can delegate to.
msDS-AllowedToDelegateTo.
36
What UserAccountControl flag must be set on a computer object to enable protocol transition for constrained delegation?
TRUSTED_TO_AUTH_FOR_DELEGATION.
37
When attacking constrained delegation with protocol transition enabled, what can an adversary do?
Impersonate any user in the domain to request a service ticket for the allowed back-end service.
38
When attacking constrained delegation without protocol transition, what is required to perform an S4U2proxy request?
An adversary must obtain a service ticket that a user has legitimately requested for the front-end service.
39
In the Rubeus `s4u` command, what is the purpose of the `/impersonateuser` parameter?
It specifies the user account to impersonate, used when protocol transition is enabled.
40
In the Rubeus `s4u` command, what is the purpose of the `/tgs` parameter?
It provides a captured front-end service ticket for a user, used when protocol transition is not enabled.
41
What is the 'Service Name Substitution' technique in Kerberos?
An attack where an adversary overwrites the unencrypted Service Principal Name (SPN) field in a valid service ticket with another SPN.
42
What is the primary condition for the Service Name Substitution attack to work?
Both the original and the substituted services must be running under the context of the same account.
43
In Rubeus, which parameter is used to perform Service Name Substitution during an S4U attack?
The `/altservice` parameter.
44
What type of Kerberos ticket is required to access remote filesystems via the SMB protocol?
A CIFS service ticket.
45
What type of Kerberos ticket is required to use Windows Remote Management (WinRM)?
An HTTP service ticket.
46
What type of Kerberos ticket is required to access Remote Desktop Protocol (RDP)?
A TERMSRV or HOST service ticket.
47
What technique can be used to force a computer, like a domain controller, to authenticate to an attacker-controlled machine?
A remote authentication trigger, such as SpoolSample or PetitPotam.
48
Why does obtaining a computer account's TGT not immediately grant an attacker administrative access to that computer?
Because computer accounts do not have remote administrative access to themselves by default.
49
What is the technique to gain control of a computer after capturing its TGT?
Use S4U2self to obtain a service ticket for an impersonated user (like Administrator) to a service on that same computer.
50
In the Rubeus `s4u` command, what does the `/self` parameter do?
It tells Rubeus to perform an S4U2self request but not a subsequent S4U2proxy request, used for the computer takeover technique.
51
The S4U2self computer takeover combines S4U2self with what other Kerberos attack technique?
Service Name Substitution (using the `/altservice` parameter).
52
What is Resource-Based Constrained Delegation (RBCD)?
A form of delegation where the back-end service controls which front-end services can delegate to it.
53
Which Active Directory attribute is used to configure Resource-Based Constrained Delegation (RBCD)?
The `msDS-AllowedToActOnBehalfOfOtherIdentity` attribute on the back-end service's account.
54
What is the main administrative benefit of RBCD over traditional constrained delegation?
It puts delegation control in the hands of the back-end service administrators, who no longer need the `SeEnableDelegationPrivilege` right.
55
What are the two conditions an adversary must meet to abuse RBCD for computer takeover?
1. Write access to the `msDS-AllowedToActOnBehalfOfOtherIdentity` attribute of a computer. 2. Control of another principal that has an SPN set.
56
In an RBCD attack, what is the purpose of performing an S4U2self request?
To get a service ticket for an impersonated user (e.g., Administrator) to the attacker-controlled principal.
57
In an RBCD attack, what is the purpose of performing an S4U2proxy request?
To use the ticket from S4U2self to obtain a service ticket for the target computer (the back-end service) as the impersonated user.
58
What is the default value for the `msDS-MachineAccountQuota` attribute in Active Directory?
10, meaning a standard domain user can create up to 10 computer accounts.
59
How can an attacker fulfill the 'principal with an SPN' requirement for an RBCD attack if they lack other credentials?
By creating a new computer account in the domain, leveraging the default `msDS-MachineAccountQuota`.
60
What is the PowerShell cmdlet used to set the `msDS-AllowedToActOnBehalfOfOtherIdentity` attribute for RBCD?
`Set-ADComputer` with the `-PrincipalsAllowedToDelegateToAccount` parameter.
61
In the Kerberos authentication flow, what key is used to encrypt the TGT?
The KDC's secret, which is the password hash of the `krbtgt` account.
62
What information does the KDC include from the TGT when creating a service ticket?
It includes a copy of the Privileged Attribute Certificate (PAC) from the TGT into the new service ticket by default.
63
What key is used to encrypt a service ticket's `EncTicketPart`?
The secret (password hash) of the service account to which the SPN is associated.
64
In a TGS-REP, what key is used to encrypt the service session key for the client's use?
The client's logon session key from the original AS exchange.
65
What is the GUID for the `ms-DS-Allowed-To-Act-On-Behalf-Of-Other-Identity` attribute, used for finding RBCD abuse primitives?
3f78c3e5-f79a-46bd-a0b8-9d18116ddc79.
66
A service ticket for which protocol is needed to run a binary via the Service Control Manager using PsExec?
CIFS.
67
To execute applications on a remote target using WMI, what service ticket(s) would be required?
RPCSS, HOST, and/or RestrictedKrbHost.