In: Computer Science
21.)Domain Controller is a server that responds to security authentication requests within a Windows Server Domain. It is a server on Windows that is responsible for allowing host access to Windows domain resources. We can consider it as a gatekeeper for user authentication and authorization. You require a PC with Windows Server operating system running on it or we can also run it through virtual machines as well. Domain Controller consists of the data that determines and validates access to your network, including any group policies and all computer names. Everything an attacker could possibly need to cause massive damage to your data and network is on the DC, which makes it a primary target. When you store credentials on a Windows computer, they are stored in C:\Users\UserName\AppData\Roaming\Microsoft\Credentials. The files that store the credentials are encrypted. However, when credentials are input for Windows Credentials, they are also stored in C:\Users\UserName\AppData\Local\Microsoft\Vault.
The attacker can Steal Windows Login Credentials Abusing the Server Message Block (SMB) Protocol, Stealing Windows credentials via Shared folder access, Stealing Windows credentials exploiting a Microsoft Outlook flaw. Attackers also use tools like Mimikatz, Metasploit to hack the credentials.
22)Rather than authentication occurring between each client machine and each server, Kerberos uses symmetric encryption and a trusted third party — known as the Key Distribution Center or KDC — to authenticate users on a network to a suite of services on a network. Once authenticated, Kerberos stores a ticket specific to that session on the user's machine and any kerberized service will look for this ticket rather than asking the user to authenticate using a password. The Kerberos system can be compromised anytime any user on the network authenticates against a non-kerberized service by sending a password in plain text. Therefore the use of non-kerberized services should be discouraged. Such services include telnet and ftp. Use of other secure protocols SSH or SSL secured services is acceptable.
Different types of attacks are:
These attacks are sorted by the privileges needed to perform them, in ascending order. Thus, to perform the first attacks only connectivity with the DC (Domain Controller) is required, which is the KDC (Key Distribution Center) for the AD (Active Directory) network. Whereas, the last attack requires a user being a Domain Administrator or having similar privileges.
Furthermore, each attack will be introduced from the pentesting perspective of 2 common scenarios:
23) Passwords are hashed and stored in the Windows SAM file or security account manager file. The file is located on your system in the path C:\Windows\System32\Config.Domain accounts passwords are stored in AD and are authenticated by DCs.fter a user provides built-in Windows user account information, the data is transmitted to the webserver. Once IIS receives the authentication data, it attempts to authenticate the user with the corresponding Windows account. This password is encoded using Base64 and sent to the server. It is important to note that the Base64 encoding is not encryption. So the drawback of this mechanism is that the user name and password are sent in clear text (unencrypted) during communication. Unlike Basic Authentication, the user name and password are not transmitted in cleartext. Instead, a cryptographically secure hash with this information is sent. There are different methods for an attacker to acquire hashed passwords that are: 1)boot your target machine to an alternate OS like NTFSDOS or Linux and just copy the SAM from the %sytemroot%system32config folder. 2) we can get the file by using pwdump2. It uses.DLL injection in order to use the system account to view and get the credentials from the registry and stores them in a handy text file that you can use. attackers need password cracking tools to crack the passwords. He can also use some websites to convert hashed credentials to a simple text file
24) Group Policy is a feature of the Microsoft Windows NT family of operating systems that controls the working environment of user accounts and computer accounts. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. Group Policy objects are applied in a hierarchical manner, and often multiple Group Policy objects are combined together to form the effective policy. Local Group Policy objects are applied first, followed by site level, domain level, and organizational unit level Group Policy objects.
In part, controls what users can and cannot do on a computer system: for example, to enforce a password complexity policy that prevents users from choosing an overly simple password, to allow or prevent unidentified users from remote computers to connect to a network share, to block access to them or to restrict access to certain folders. A set of such configurations is called a Group Policy Object (GPO).
As part of Microsoft's IntelliMirror technologies, Group Policy aims to reduce the cost of supporting users. IntelliMirror technologies relate to the management of disconnected machines or roaming users and include roaming user profiles, folder redirection, and offline files.
This step-by-step article describes how to use Group Policy to automatically distribute programs to client computers or users. You can use Group Policy to distribute computer programs by using the following methods: