Defence

Ok so here’s the thing, I do NOT like getting pwn3d! I think you probably would rather your organisation does not too!

Read more: What are the top Active Directory Security vulnerabilities I care about?

What I really don’t want to occur is a ransomware event! They suck, they are like a digital bomb going off.

So I’ve knocked up a quick list to get people thinking (these are NOT all the vulnerabilities I networks you should care about.. but they are some that could lead to a ransomware event!)

  1. Weak passwords
  2. Service accounts vulnerable to “Kerberoasting” attacks
  3. Insecure Active Directory Services Certificate Services configurations
  4. Overly permissive delegations
  5. Large number of people in high privilege roles/groups
  6. LDAP NULL Bind
  7. Passwords in description fields
  8. Passwords in SYSVOL
  9. Passwords in Files/SharePoint (ok that’s a bit away from AD but it’s important)
  10. Lack of MFA on internet facing access (e.g. VPN, Email etc.)
  11. Servers/PC devices with the same local administrator password (vulnerable to pass the hash attacks)
  12. Insecure SCCM Configurations
  13. Domain joined backups (e.g. joined to the corporate domain)
  14. Virtual infrastructure that is owned by the corporate domain

They key thing here is to think about identity planes and what impacts COULD occur?

Take vSphere environments… if your Active Directory environment gets compromised could a threat actor attack this? what about backups? If everything is linked from an identity point of view… if someone gets to Enterprise or Domain Admin… is everything at risk?

I’ll be looking at this subject again more in the future… and how we can discovery, remediate and re-design… so that ransomware (from an encryption perspective becomes a much less likely event, do bear in mind, data theft and extortion is still a risk!)