Active Directory Through an Attacker's Lens

    Say you work as the sole IT personnel in a small newly formed company. This company currently has five computers which could be easy for you to manage, but as the company grows, the computers you are tasked to handle will grow with it. This can quickly lead to there being too much for a single person to oversee, causing the company to look for solutions for easier management of the company's ever-growing computer arsenal. This is where Active Directory can step in and take some significant load off the IT Department's shoulders. 

 

What is Active Directory

    Active Directory is Microsoft's directory service that can be implemented into company networks for more accessible and efficient management of their resources. This will allow the administrators to set up groups, users, Organizational Units, Computers, etc., and manage all the differing policies and access each person has to the network more easily. This is an extensive system with many different features that allow administrators to tailor the domain to their company's needs. 

    Active Directory Domain Services is the primary feature that helps store domain objects and manage the interaction of the users within the domain. This will help delegate each user's access as they attempt to connect to each of the network's resources. This will also contain Group Policies, which are implemented to delegate permissions, enforce security, customize the user experience, and maintain network consistency. These are implemented onto Organizational Units, which will be comprised of different objects in the domain. [1]

    Active Directory uses a tiered layout consisting of domains, trees, and forests. The first domain will create the forest and be part of a tree in said forest. This tree can then have additional domains added to it, which would include the original domains name, called subdomains. When a new domain is created apart from this initial domain, this will create another tree. All these trees will be under the initial forest. [2]

    This hierarchy of domains will use trusts to manage the access that each of the domains has with each other. There are many different types of trusts, including one-way, two-way, trusted domain, transitive, intransitive, explicit, forest, etc. One-way trusts are when one domain has access privileges to a second domain but not the other direction. A two-way trust occurs when both domains have access privileges to each other. [3]

 

The Attacker's POV

    Over 90% of Fortune 1000 companies have Active Directory in their environment. [4] If an attacker targets one of these companies, they are highly likely to come across an Active Directory in the network. These Active Directory systems have significant control over the company's network, primarily managing their resources, including databases. These databases can have valuable information, allowing the attacker to sell what they could exfiltrate to the dark web. On top of this, these organizations often rely on their systems to generate income, and if this system goes down, it can cause the company to lose money that they would otherwise be generating. If an attacker can gain privileged access to the domain, they could hold the company's network ransom, preventing it from conducting daily operations. Today, the average ransomware payment is up to $1.5 million. [5] This is why attackers study Active Directory. It is the crutch of many companies' systems, and with one fell swoop, an attacker can bring even the most prominent companies to their knees, forcing them to lose millions or even billions of dollars in revenue. 



Resources

[1] https://www.techtarget.com/searchwindowsserver/definition/Active-Directory

[2] https://www.oreilly.com/library/view/dns-on-windows/0596005628/ch08s01s01.html

[3]https://www.windows-active-directory.com/active-directory-trusts.html

[4] https://www.securitymagazine.com/articles/96245-how-to-convince-the-c-suite-to-buy-in-to-active-directory-security

[5] https://www.theguardian.com/technology/2023/may/10/ransomware-payments-nearly-double-in-one-year

 

Popular posts from this blog

VHL002 - Setting up the Domain Controller and Workstations

VHL005 - Own the Workstations, Local Admin Password Re-use

VHL004 - LLMNR Poisoning

VHL003 - Kali Linux Setup

VHL001 - In the Beginning