Now that we have several credentials in hand from Password Spraying, we should now go ahead and enumerate Security Controls.
Windows Defender
Windows Defender has greatly improved and most likely block tools such as PowerView.
There are ways to bypass these restrictions.
To obtain current Defender status:
We can see that RealTimeProtectionEnabled
parameter is set to True, meaning Defender is enabled on the system.
AppLocker
Application whitelist is a list of approved software applications or executables that are all allowed to run on system.
AppLocker is a whitelisting solution and gives system admins control over which applications and files users can run.
It is common for organizations to block cmd.exe and PowerShell.exe and write access to certain directories but this can be all bypassed.
For example, organization often forgets about blocking PowerShell executable locations such as:
%SystemRoot%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
or PowerShell_ISE.exe
To get AppLocker Policy:
PowerShell Constrained Language Mode
PowerShell Constrained Language Mode locks down many of the features needed to use PowerShell effectively.
To tell whether if we are in full language more or Constrained language mode:
LAPS
LAPS (Local Administrator Password Solution)
Used for randomizing and rotating local administrator passwords on Windows hosts and prevent lateral movement.
We can enumerate what domain users can read the LAPS password set for machines with LAPS installed and what machines do not have LAPS installed.
LAPSToolkitcould be used for the above purpose.
LAPSToolkitprovides features such as:
- Show groups delegated to read LAPS passwords.
Enumeration may show a user account that can read the LAPS password on a host.
Using Find-LAPSDelegatedGroups:
Find-AdmPwdExtendedRights
- Checks the rights on each computer with LAPS enabled for any groups with read access and users with “All Extended Rights”.
Users with “‘All Extended Rights” can read LAPS passwords and may be less protected than users in delegated groups.
Using Find-AdmPwdExtendedRights:
Using Get-LAPSComputers:
Moving On
We have beachhead host compromised.
Before moving on to different hosts, it is better to understand what protections are in place.
Now let’s move to further enumeration on the domain using the bechhead system.