Module 17 Flashcards

(28 cards)

1
Q

What is the primary objective of the Domain Dominance phase for an adversary?

A

To extract highly-sensitive authentication material to ensure they can maintain domain admin-level privileges almost indefinitely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The three techniques discussed for achieving Domain Dominance are DCSync, Ticket Forgery, and _____.

A

DPAPI Backup Keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the legitimate function of the Directory Replication Service (DRS) protocol in Active Directory?

A

It is used by domain controllers to replicate data, such as new user information, between themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the DCSync technique [T1003.006] from an adversarial perspective?

A

An adversary leverages the Directory Replication Service (DRS) protocol to pull replication data, specifically usernames and password hashes, from a domain controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What level of privilege is required to perform a DCSync attack?

A

Access as a domain or enterprise admin, or a domain controller computer account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Mimikatz command is used to perform a DCSync attack?

A

The lsadump::dcsync command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the Cobalt Strike Beacon tool, what alias is a wrapper around Mimikatz’s DCSync capability?

A

The dcsync alias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a common and highly valuable target account for an adversary using DCSync?

A

The krbtgt account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is the password hash of the krbtgt account so valuable to an attacker?

A

It is used to encrypt and sign Kerberos Ticket Granting Tickets (TGTs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What capability does an adversary gain by possessing the krbtgt account’s password hash?

A

They can forge valid Ticket Granting Tickets (TGTs) for any user in the domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is the krbtgt account a good candidate for ensuring long-term, high-privileged access?

A

Its password is not changed automatically by Active Directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

From a defensive (OPSEC) perspective, why can’t the mere presence of DRS protocol traffic be considered a breach?

A

Because the Directory Replication Service (DRS) protocol is legitimately used for normal domain controller operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can defenders identify potentially malicious DCSync activity?

A

By looking for anomalous replication requests, such as those originating from IP addresses other than known domain controllers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Windows Event ID is logged for directory service replication when Directory Service Access auditing is enabled?

A

Event ID 4662.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the identifying GUID for the DS-Replication-Get-Changes and DS-Replication-Get-Changes-All operations in a 4662 event?

A

1131f6aa-9c07-11d1-f79f-00c04fc2dcd2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the identifying GUID for the DS-Replication-Get-Changes-In-Filtered-Set operation in a 4662 event?

A

89e95b76-444d-4c62-991a-0facbeda640c

17
Q

In Windows, what technology is used to protect secrets stored in places like the Credential Manager?

A

The Data Protection API (DPAPI).

18
Q

In the DPAPI system, a user’s secrets are encrypted with a randomly generated AES key called a _____.

19
Q

The private key that DPAPI uses to encrypt a user’s masterkey is derived from what?

A

The user’s password.

20
Q

What mechanism allows a user to access their DPAPI-protected secrets after their password has been changed?

A

A copy of the user’s masterkey is encrypted with a ‘backup key’ that is stored in Active Directory.

21
Q

From an adversarial perspective, what is the ultimate goal of obtaining the domain’s DPAPI backup key?

A

To decrypt all DPAPI blobs for any user in the domain.

22
Q

How often is the domain’s DPAPI backup key automatically changed by Active Directory?

A

It is never automatically changed.

23
Q

What protocol can be used by a domain administrator to extract the DPAPI backup key from a domain controller?

A

The BackupKey Remote Protocol.

24
Q

Which Mimikatz command is used to extract the domain’s DPAPI backup key?

A

The lsadump::backupkeys command.

25
Which SharpDPAPI command is used to extract the domain's DPAPI backup key?
The `backupkey` command.
26
When using SharpDPAPI to decrypt user credentials, which parameter is used to provide the extracted domain backup key?
The `/pvk` parameter.
27
What access level on a local computer allows an adversary to enumerate saved credentials for all users on that machine?
Local administrator access.
28
Why would an administrator account (e.g., `dyork`) need the domain backup key to read another user's (e.g., `pchilds`) DPAPI-protected credentials?
Because the administrator cannot normally recover the other user's masterkey, which is derived from that user's password.