Active Directory Through an Attacker's Lens
Say you work as the sole IT personnel in a small newly formed company. This company currently has five computers which could be easy for you to manage, but as the company grows, the computers you are tasked to handle will grow with it. This can quickly lead to there being too much for a single person to oversee, causing the company to look for solutions for easier management of the company's ever-growing computer arsenal. This is where Active Directory can step in and take some significant load off the IT Department's shoulders.
What is Active Directory
Active Directory is Microsoft's directory service that can be implemented into company networks for more accessible and efficient management of their resources. This will allow the administrators to set up groups, users, Organizational Units, Computers, etc., and manage all the differing policies and access each person has to the network more easily. This is an extensive system with many different features that allow administrators to tailor the domain to their company's needs.
Active Directory Domain Services is
the primary feature that helps store domain objects and manage the interaction
of the users within the domain. This will help delegate each user's access as
they attempt to connect to each of the network's resources. This will also
contain Group Policies, which are implemented to delegate permissions, enforce
security, customize the user experience, and maintain network consistency.
These are implemented onto Organizational Units, which will be comprised of
different objects in the domain. [1]
Active Directory uses a tiered
layout consisting of domains, trees, and forests. The first domain will create
the forest and be part of a tree in said forest. This tree can then have
additional domains added to it, which would include the original domains name,
called subdomains. When a new domain is created apart from this initial domain,
this will create another tree. All these trees will be under the initial
forest. [2]
This hierarchy of domains will use
trusts to manage the access that each of the domains has with each other. There
are many different types of trusts, including one-way, two-way, trusted domain,
transitive, intransitive, explicit, forest, etc. One-way trusts are when one
domain has access privileges to a second domain but not the other direction. A
two-way trust occurs when both domains have access privileges to each other. [3]
The Attacker's POV
Over 90% of Fortune 1000 companies have Active Directory in their environment. [4] If an attacker targets one of these companies, they are highly likely to come across an Active Directory in the network. These Active Directory systems have significant control over the company's network, primarily managing their resources, including databases. These databases can have valuable information, allowing the attacker to sell what they could exfiltrate to the dark web. On top of this, these organizations often rely on their systems to generate income, and if this system goes down, it can cause the company to lose money that they would otherwise be generating. If an attacker can gain privileged access to the domain, they could hold the company's network ransom, preventing it from conducting daily operations. Today, the average ransomware payment is up to $1.5 million. [5] This is why attackers study Active Directory. It is the crutch of many companies' systems, and with one fell swoop, an attacker can bring even the most prominent companies to their knees, forcing them to lose millions or even billions of dollars in revenue.
Resources
[1] https://www.techtarget.com/searchwindowsserver/definition/Active-Directory
[2] https://www.oreilly.com/library/view/dns-on-windows/0596005628/ch08s01s01.html
[3]https://www.windows-active-directory.com/active-directory-trusts.html
[5] https://www.theguardian.com/technology/2023/may/10/ransomware-payments-nearly-double-in-one-year