2017 BSidesCharm DetectingtheElusive ActiveDirectoryThreatHunting Final
2017 BSidesCharm DetectingtheElusive ActiveDirectoryThreatHunting Final
https://www.carbonblack.com/2016/03/25/threat-alert-powerware-new-ransomware-written-in-powershell-targets-organizations-via-microsoft-word/
Sean Metcalf [@Pyrotek3 | [email protected]]
Microsoft Office Macros (VBA)
https://www.fireeye.com/blog/threat-research/2015/10/macros_galore.html
Sean Metcalf [@Pyrotek3 | [email protected]]
@JohnLaTwC
https://onedrive.live.com/?authkey=%21ADev0bfQMNxv504&cid=C96A3EEDCE316E4C&id=C96A3EEDCE316E4C%21114&par
Sean Metcalf [@Pyrotek3 | [email protected]]
Id=C96A3EEDCE316E4C%21109&o=OneUp
Microsoft OLE
• OLE Package (packager.dll)
Windows 3.1 to Windows 10.
https://medium.com/@networksecurity/oleoutlook-bypass-almost-every-corporate-security-control-with-a-point-n-click-gui-37f4cbc107d0
• Look for random function names & many unusual characters not
normally in PowerShell scripts.
Sean Metcalf [@Pyrotek3 | [email protected]]
Offensive PowerShell Detection Cheatsheet
• AdjustTokenPrivileges • TOKEN_ADJUST_PRIVILEGES
• IMAGE_NT_OPTIONAL_HDR64_MAGIC • TOKEN_ALL_ACCESS
• Management.Automation.RuntimeException • TOKEN_ASSIGN_PRIMARY
• Microsoft.Win32.UnsafeNativeMethods • TOKEN_DUPLICATE
• ReadProcessMemory.Invoke • TOKEN_ELEVATION
• Runtime.InteropServices • TOKEN_IMPERSONATE
• SE_PRIVILEGE_ENABLED • TOKEN_INFORMATION_CLASS
• System.Security.Cryptography • TOKEN_PRIVILEGES
• System.Reflection.AssemblyName • TOKEN_QUERY
• System.Runtime.InteropServices • Metasploit
• LSA_UNICODE_STRING • Advapi32.dll
• kernel32.dll
• MiniDumpWriteDump
• AmsiUtils
• PAGE_EXECUTE_READ
• KerberosRequestorSecurityToken
• Net.Sockets.SocketFlags
• Security.Cryptography.CryptoStream
• Reflection.Assembly
• ScriptBlockLogging
• SECURITY_DELEGATION
• LogPipelineExecutionDetails
• CreateDelegate
Sean Metcalf [@Pyrotek3 | [email protected]] • ProtectedEventLogging
Auditing Attack Activity
When the manual is not enough – runas /netonly, Unexpected Credential Exposure and the Need for Reality Based
Holistic Threat Models
https://blogs.technet.microsoft.com/jepayne/2016/04/04/when-the-manual-is-not-enough-runas-netonly-unexpected-
credential-exposure-and-the-need-for-reality-based-holistic-threat-models/ Sean Metcalf [@Pyrotek3 | [email protected]]
Mitigation: RunAs /NetOnly
When the manual is not enough – runas /netonly, Unexpected Credential Exposure and the Need for Reality Based
Holistic Threat Models
https://blogs.technet.microsoft.com/jepayne/2016/04/04/when-the-manual-is-not-enough-runas-netonly-unexpected-
credential-exposure-and-the-need-for-reality-based-holistic-threat-models/