SlideShare a Scribd company logo
1 of 24
Keep calm and monitor PowerShell
Major issues with native PowerShell (PS) auditing
Large volume of logs generated (e.g. greater than 100 logs
must be checked to detect a potential brute-force attack)
Users may use PS for legitimate reasons - Numerous logs that are a
combination of malicious PS scripts and legitimate scripts
Limited search capabilities - No filtered search (e.g. tracking
malicious scripts by reading the code, commands invoked, etc.)
No instant alerts upon the execution of malicious commands/scripts
Cannot apply remedial measures when malicious scripts/cmdlets are
detected
The ADAudit Plus approach to detect PowerShell attacks
Performs filtered searches
for malicious PS
commands/scripts
Alerts the admin via
SMS/email
Takes corrective action
Attacker gains access/insider
goes rogue
Runs a malicious script
using PS
Detecting PowerShell-based attacks with ADAudit Plus
Get a bird’s-eye view on all PowerShell scripts
Bird’s-eye view of scripts and
commands executed by users
Granular search based on users, commands invoked, and
more
A classic brute-force attack on the administrator account
• The simplicity of a brute-force attack is that a malicious actor can try numerous
predictable and vulnerable password patterns to compromise a user’s password
• Often these attacks involve manually keying in a password during native logons,
which can raise suspicion due to the rise in the number of logon failures
• But with PowerShell, millions of passwords can be brute-forced:
– And the administrator account (with the SID 500) is likely the target, because these
accounts can never be deleted from Active Directory and have no lockout policy!
Detecting PowerShell-based brute-force attacks with ADAudit Plus
Perform granular
searches about users
who executed PS
scripts, and get the
script path
Find the
exact script
code
Search based
on commands
invoked
A domain password spray attack using PowerShell
• A domain password spray attack could be a slightly more advanced version of a
typical brute-force attack
• In a password spray attack, an attacker specifies an entire password list or a single
password, and performs a spray attempt on all accounts within the domain
• The password spray is performed very cautiously to not lockout any account and is
within the lockout threshold, and there is always a 30-minute wait between sprays
(which can be modified based on the lockout observation window)
Detecting password spray attacks with ADAudit Plus
A code block in the
script to get the
lockout counter
reset time
Find details like the
name, SID of
account who ran
the script, and more
Find complete
script details
Specific script functions (like finding the lockout observation window) can be detected
with ADAudit Plus, and corrective actions (like changing the lockout observation time )
can be immediately performed to counter the attack attempt
Privilege escalation attacks using PowerShell
• PowerShell is not only used for password-based attacks, but for post-
exploitation activities, like privilege escalation as well
• Powerup is a PowerShell tool that allows a malicious actor, with the
help of PowerShell script, to install and execute a Windows Installer
(MSI) application
• The MSI application, when run, offers a GUI to secretly add a backdoor
user to any group within Active Directory
Detecting privilege escalation attacks with ADAudit Plus
Function to get a list of
unattended install files
(that may have
deployment credentials)
for privilege escalation
Function to write out
a pre-compiled MSI
installer that
prompts for
user/group addition
Function to
get a list of
exploitable
services
Bypassing execution policies with PowerShell
• The starting point before running any malicious PowerShell script is
bypassing the default execution policy
• The execution policy, if set to restricted, prevents malicious actors
from running PowerShell scripts/code that are not authorized by
Microsoft or are not from verified sources
• But it is also extremely easy to bypass these policies; all you need to do
is run the command Set-ExecutionPolicy unrestricted, and that’s it!
Any malicious code can now be executed without any hindrance
Detecting execution policy bypass attempts with ADAudit Plus
Search for bypassing
commands and which
user invoked it
Find the exact
commands run,
values changed, etc.
Attacking Exchange Servers with PowerShell
• PowerShell can be used to attack not only Active Directory, but hybrid environments,
too – in this case, Exchange or Office 365
• MailSniper is a free tool that can be used to perform guessing attacks to
compromise domains and usernames; it can also perform a password spray attack
on the accounts that have a mailbox in the Exchange Server
• And once a user is compromised, the credentials can be used to perform a global
mail search, and write out emails (in a CSV file) containing sensitive data (logon
credentials)
Discovering Exchange/0ffice365 attacks with ADAudit Plus
Get credential
command, which
provides a dialog
box to enter
account credentials
An Invoke-
WebRequest to
connect to an
Exchange Server
A GlobalMailSearch
attempt to read emails
being passed within an
organization
Get-Credential: This command can be used by an attacker to obtain a user's credentials.
An unassuming user, upon seeing a dialog box prompting for credentials, will enter the
required details under the impression that it is a legitimate request
There is more than one way to leverage PowerShell for attacks
Detecting remote PowerShell attempts, version downgrades, and third-party
attack toolkit use with ADAudit Plus
An attempt to
create a PS remote
session to remotely
execute commands
Often, a first step in
PSRemote attacks:
enabling remoting
within PowerShell
A PowerShell version
downgrade attempt to enable
an earlier version of PS that
lacks essential security
features
Invoking a third party
tool (Mimikatz) for
post-exploitation
activities
Set up customized PowerShell alerts with ADAudit Plus
Instant PowerShell-based alerts
Set threshold-
based alerts
Granularly filter
alerts based on
various
parameters
Instantly notify
the admin/take
corrective action
PowerShell-based attacks are on the rise. It is crucial to have a bird’s-eye view of all
PowerShell-based activities and a strong 24x7 defense mechanism
Stay alert with
Abhilash Mamidela
abi@manageengine.com
Get your free trial!

More Related Content

What's hot

Surah Al Furqan
Surah Al FurqanSurah Al Furqan
Surah Al FurqanAzaakhaana
 
Diploma in Chinese
Diploma in ChineseDiploma in Chinese
Diploma in ChineseChen Zhao
 
นักสู้สลาตัน 02
นักสู้สลาตัน 02นักสู้สลาตัน 02
นักสู้สลาตัน 02sornblog2u
 
Teks viler specijal 16 pustinjski razbojnici (scancl) (dusky&zika teror...
Teks viler specijal 16   pustinjski razbojnici (scancl) (dusky&zika teror...Teks viler specijal 16   pustinjski razbojnici (scancl) (dusky&zika teror...
Teks viler specijal 16 pustinjski razbojnici (scancl) (dusky&zika teror...zoran radovic
 
Tex Willer Libellus Kolor Biblioteka 002 - Odmetnik
Tex Willer Libellus Kolor Biblioteka 002 - OdmetnikTex Willer Libellus Kolor Biblioteka 002 - Odmetnik
Tex Willer Libellus Kolor Biblioteka 002 - OdmetnikStripovizijacom
 
ZS - 0377 - Teks Viler - VINDEKSOVE PUME
ZS - 0377 - Teks Viler - VINDEKSOVE PUMEZS - 0377 - Teks Viler - VINDEKSOVE PUME
ZS - 0377 - Teks Viler - VINDEKSOVE PUMEStripovizijacom
 
Tex Willer Strip Agent Gigant 004 - Ubojice
Tex Willer Strip Agent Gigant 004 - UbojiceTex Willer Strip Agent Gigant 004 - Ubojice
Tex Willer Strip Agent Gigant 004 - UbojiceStripovizijacom
 
เทพบุตรกู้บัลลังค์ เล่ม 7
เทพบุตรกู้บัลลังค์ เล่ม 7เทพบุตรกู้บัลลังค์ เล่ม 7
เทพบุตรกู้บัลลังค์ เล่ม 7sornblog2u
 
0017. Morske Hijene
0017. Morske Hijene0017. Morske Hijene
0017. Morske HijeneTompa *
 
Mechanical engineering certificate
Mechanical engineering certificateMechanical engineering certificate
Mechanical engineering certificateMohammedNizam23
 
Teks Viler VC 068 - Krv u raju
Teks Viler VC 068 - Krv u rajuTeks Viler VC 068 - Krv u raju
Teks Viler VC 068 - Krv u rajuStripovizijacom
 
Zagor vec 057 crna krila noci
Zagor vec 057 crna krila nociZagor vec 057 crna krila noci
Zagor vec 057 crna krila nociDino dino
 
Chapter 7 - Introduction to Windows Desktop ~ Urdu Guide
Chapter 7 - Introduction to Windows Desktop ~ Urdu GuideChapter 7 - Introduction to Windows Desktop ~ Urdu Guide
Chapter 7 - Introduction to Windows Desktop ~ Urdu GuideMuhammad Tayyab Rana
 
certificate of apprenticeship training
certificate of apprenticeship trainingcertificate of apprenticeship training
certificate of apprenticeship trainingSabir Aboobacker
 

What's hot (20)

Surah Al Furqan
Surah Al FurqanSurah Al Furqan
Surah Al Furqan
 
Diploma in Chinese
Diploma in ChineseDiploma in Chinese
Diploma in Chinese
 
OSV - Unit - 3 - Concurrency
OSV - Unit - 3 - ConcurrencyOSV - Unit - 3 - Concurrency
OSV - Unit - 3 - Concurrency
 
Almarai Certificate
Almarai CertificateAlmarai Certificate
Almarai Certificate
 
นักสู้สลาตัน 02
นักสู้สลาตัน 02นักสู้สลาตัน 02
นักสู้สลาตัน 02
 
Teks viler specijal 16 pustinjski razbojnici (scancl) (dusky&zika teror...
Teks viler specijal 16   pustinjski razbojnici (scancl) (dusky&zika teror...Teks viler specijal 16   pustinjski razbojnici (scancl) (dusky&zika teror...
Teks viler specijal 16 pustinjski razbojnici (scancl) (dusky&zika teror...
 
Tex lib 034 - Urota (01)
Tex lib 034 - Urota (01)Tex lib 034 - Urota (01)
Tex lib 034 - Urota (01)
 
Tex Willer Libellus Kolor Biblioteka 002 - Odmetnik
Tex Willer Libellus Kolor Biblioteka 002 - OdmetnikTex Willer Libellus Kolor Biblioteka 002 - Odmetnik
Tex Willer Libellus Kolor Biblioteka 002 - Odmetnik
 
Zagor - Akt nasilja
Zagor - Akt nasiljaZagor - Akt nasilja
Zagor - Akt nasilja
 
ZS - 0377 - Teks Viler - VINDEKSOVE PUME
ZS - 0377 - Teks Viler - VINDEKSOVE PUMEZS - 0377 - Teks Viler - VINDEKSOVE PUME
ZS - 0377 - Teks Viler - VINDEKSOVE PUME
 
Tex Willer Strip Agent Gigant 004 - Ubojice
Tex Willer Strip Agent Gigant 004 - UbojiceTex Willer Strip Agent Gigant 004 - Ubojice
Tex Willer Strip Agent Gigant 004 - Ubojice
 
เทพบุตรกู้บัลลังค์ เล่ม 7
เทพบุตรกู้บัลลังค์ เล่ม 7เทพบุตรกู้บัลลังค์ เล่ม 7
เทพบุตรกู้บัลลังค์ เล่ม 7
 
0017. Morske Hijene
0017. Morske Hijene0017. Morske Hijene
0017. Morske Hijene
 
Mechanical engineering certificate
Mechanical engineering certificateMechanical engineering certificate
Mechanical engineering certificate
 
Murena 05
Murena 05Murena 05
Murena 05
 
Teks Viler VC 068 - Krv u raju
Teks Viler VC 068 - Krv u rajuTeks Viler VC 068 - Krv u raju
Teks Viler VC 068 - Krv u raju
 
Zagor vec 057 crna krila noci
Zagor vec 057 crna krila nociZagor vec 057 crna krila noci
Zagor vec 057 crna krila noci
 
Chapter 7 - Introduction to Windows Desktop ~ Urdu Guide
Chapter 7 - Introduction to Windows Desktop ~ Urdu GuideChapter 7 - Introduction to Windows Desktop ~ Urdu Guide
Chapter 7 - Introduction to Windows Desktop ~ Urdu Guide
 
certificate of apprenticeship training
certificate of apprenticeship trainingcertificate of apprenticeship training
certificate of apprenticeship training
 
Vajat erp 139
Vajat erp 139Vajat erp 139
Vajat erp 139
 

Similar to IT security : Keep calm and monitor PowerShell

Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentationowasp-pune
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
 
Security In PHP Applications
Security In PHP ApplicationsSecurity In PHP Applications
Security In PHP ApplicationsAditya Mooley
 
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Defcon 25 Packet Hacking Village - Finding Your Way to Domain AccessDefcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Accesseightbit
 
Introduction to Web Application Security Principles
Introduction to Web Application Security Principles Introduction to Web Application Security Principles
Introduction to Web Application Security Principles Dr. P. Mohana Priya
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10bilcorry
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаPositive Hack Days
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...😸 Richard Spindler
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxkarthikvcyber
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Security Innovation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP SecurityNasir Gondal
 

Similar to IT security : Keep calm and monitor PowerShell (20)

Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Owasp first5 presentation
Owasp first5 presentationOwasp first5 presentation
Owasp first5 presentation
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Security testing
Security testingSecurity testing
Security testing
 
Security testing
Security testingSecurity testing
Security testing
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
Security In PHP Applications
Security In PHP ApplicationsSecurity In PHP Applications
Security In PHP Applications
 
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Defcon 25 Packet Hacking Village - Finding Your Way to Domain AccessDefcon 25 Packet Hacking Village - Finding Your Way to Domain Access
Defcon 25 Packet Hacking Village - Finding Your Way to Domain Access
 
Introduction to Web Application Security Principles
Introduction to Web Application Security Principles Introduction to Web Application Security Principles
Introduction to Web Application Security Principles
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
 
I Hunt Sys Admins
I Hunt Sys AdminsI Hunt Sys Admins
I Hunt Sys Admins
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Security testing
Security testingSecurity testing
Security testing
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
VAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptxVAPT_FINAL SLIDES.pptx
VAPT_FINAL SLIDES.pptx
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 

More from ManageEngine

There's more than one way to get admin privileges
There's more than one way to get admin privilegesThere's more than one way to get admin privileges
There's more than one way to get admin privilegesManageEngine
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategyManageEngine
 
ManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineManageEngine
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusManageEngine
 
IT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusIT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusManageEngine
 
IT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusIT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusManageEngine
 
IT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusIT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusManageEngine
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?ManageEngine
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?ManageEngine
 
Desmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIDesmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIManageEngine
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-IIManageEngine
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?ManageEngine
 
Desmitificando SNMP
Desmitificando SNMPDesmitificando SNMP
Desmitificando SNMPManageEngine
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-IManageEngine
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...ManageEngine
 
Webinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesWebinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesManageEngine
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessManageEngine
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine
 
VMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual EnvironmentVMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual EnvironmentManageEngine
 

More from ManageEngine (20)

There's more than one way to get admin privileges
There's more than one way to get admin privilegesThere's more than one way to get admin privileges
There's more than one way to get admin privileges
 
8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy8 must dos for a perfect privileged account management strategy
8 must dos for a perfect privileged account management strategy
 
ManageEngine's Patch Manager Plus
ManageEngine's Patch Manager PlusManageEngine's Patch Manager Plus
ManageEngine's Patch Manager Plus
 
Ease out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngineEase out the GDPR adoption with ManageEngine
Ease out the GDPR adoption with ManageEngine
 
Major Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk PlusMajor Incident Management in ServiceDesk Plus
Major Incident Management in ServiceDesk Plus
 
IT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk PlusIT Incident Management in ServiceDesk Plus
IT Incident Management in ServiceDesk Plus
 
IT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk PlusIT Change Management in ServiceDesk Plus
IT Change Management in ServiceDesk Plus
 
IT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk PlusIT Asset Management in ServiceDesk Plus
IT Asset Management in ServiceDesk Plus
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?Webinar - How to Get Real-Time Network Management Right?
Webinar - How to Get Real-Time Network Management Right?
 
Desmitificando SNMP Parte-II
Desmitificando SNMP Parte-IIDesmitificando SNMP Parte-II
Desmitificando SNMP Parte-II
 
SNMP Demystified Part-II
SNMP Demystified Part-IISNMP Demystified Part-II
SNMP Demystified Part-II
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
 
Desmitificando SNMP
Desmitificando SNMPDesmitificando SNMP
Desmitificando SNMP
 
SNMP Demystified Part-I
SNMP Demystified Part-ISNMP Demystified Part-I
SNMP Demystified Part-I
 
How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...How Application Discovery and Dependency Mapping can stop you from losing cus...
How Application Discovery and Dependency Mapping can stop you from losing cus...
 
Webinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service CataloguesWebinar - The Science Behind Effective Service Catalogues
Webinar - The Science Behind Effective Service Catalogues
 
Webinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your businessWebinar - 8 ways to align IT to your business
Webinar - 8 ways to align IT to your business
 
ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...ManageEngine - Forrester Webinar: Maximize your application performance to en...
ManageEngine - Forrester Webinar: Maximize your application performance to en...
 
VMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual EnvironmentVMware Monitoring - Discover And Monitor Your Virtual Environment
VMware Monitoring - Discover And Monitor Your Virtual Environment
 

Recently uploaded

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 

Recently uploaded (20)

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 

IT security : Keep calm and monitor PowerShell

  • 1. Keep calm and monitor PowerShell
  • 2. Major issues with native PowerShell (PS) auditing Large volume of logs generated (e.g. greater than 100 logs must be checked to detect a potential brute-force attack) Users may use PS for legitimate reasons - Numerous logs that are a combination of malicious PS scripts and legitimate scripts Limited search capabilities - No filtered search (e.g. tracking malicious scripts by reading the code, commands invoked, etc.) No instant alerts upon the execution of malicious commands/scripts Cannot apply remedial measures when malicious scripts/cmdlets are detected
  • 3. The ADAudit Plus approach to detect PowerShell attacks Performs filtered searches for malicious PS commands/scripts Alerts the admin via SMS/email Takes corrective action Attacker gains access/insider goes rogue Runs a malicious script using PS
  • 5. Get a bird’s-eye view on all PowerShell scripts Bird’s-eye view of scripts and commands executed by users Granular search based on users, commands invoked, and more
  • 6. A classic brute-force attack on the administrator account • The simplicity of a brute-force attack is that a malicious actor can try numerous predictable and vulnerable password patterns to compromise a user’s password • Often these attacks involve manually keying in a password during native logons, which can raise suspicion due to the rise in the number of logon failures • But with PowerShell, millions of passwords can be brute-forced: – And the administrator account (with the SID 500) is likely the target, because these accounts can never be deleted from Active Directory and have no lockout policy!
  • 7. Detecting PowerShell-based brute-force attacks with ADAudit Plus Perform granular searches about users who executed PS scripts, and get the script path Find the exact script code Search based on commands invoked
  • 8. A domain password spray attack using PowerShell • A domain password spray attack could be a slightly more advanced version of a typical brute-force attack • In a password spray attack, an attacker specifies an entire password list or a single password, and performs a spray attempt on all accounts within the domain • The password spray is performed very cautiously to not lockout any account and is within the lockout threshold, and there is always a 30-minute wait between sprays (which can be modified based on the lockout observation window)
  • 9. Detecting password spray attacks with ADAudit Plus A code block in the script to get the lockout counter reset time Find details like the name, SID of account who ran the script, and more Find complete script details
  • 10. Specific script functions (like finding the lockout observation window) can be detected with ADAudit Plus, and corrective actions (like changing the lockout observation time ) can be immediately performed to counter the attack attempt
  • 11. Privilege escalation attacks using PowerShell • PowerShell is not only used for password-based attacks, but for post- exploitation activities, like privilege escalation as well • Powerup is a PowerShell tool that allows a malicious actor, with the help of PowerShell script, to install and execute a Windows Installer (MSI) application • The MSI application, when run, offers a GUI to secretly add a backdoor user to any group within Active Directory
  • 12. Detecting privilege escalation attacks with ADAudit Plus Function to get a list of unattended install files (that may have deployment credentials) for privilege escalation Function to write out a pre-compiled MSI installer that prompts for user/group addition Function to get a list of exploitable services
  • 13. Bypassing execution policies with PowerShell • The starting point before running any malicious PowerShell script is bypassing the default execution policy • The execution policy, if set to restricted, prevents malicious actors from running PowerShell scripts/code that are not authorized by Microsoft or are not from verified sources • But it is also extremely easy to bypass these policies; all you need to do is run the command Set-ExecutionPolicy unrestricted, and that’s it! Any malicious code can now be executed without any hindrance
  • 14. Detecting execution policy bypass attempts with ADAudit Plus Search for bypassing commands and which user invoked it Find the exact commands run, values changed, etc.
  • 15. Attacking Exchange Servers with PowerShell • PowerShell can be used to attack not only Active Directory, but hybrid environments, too – in this case, Exchange or Office 365 • MailSniper is a free tool that can be used to perform guessing attacks to compromise domains and usernames; it can also perform a password spray attack on the accounts that have a mailbox in the Exchange Server • And once a user is compromised, the credentials can be used to perform a global mail search, and write out emails (in a CSV file) containing sensitive data (logon credentials)
  • 16. Discovering Exchange/0ffice365 attacks with ADAudit Plus Get credential command, which provides a dialog box to enter account credentials An Invoke- WebRequest to connect to an Exchange Server A GlobalMailSearch attempt to read emails being passed within an organization
  • 17. Get-Credential: This command can be used by an attacker to obtain a user's credentials. An unassuming user, upon seeing a dialog box prompting for credentials, will enter the required details under the impression that it is a legitimate request
  • 18. There is more than one way to leverage PowerShell for attacks
  • 19. Detecting remote PowerShell attempts, version downgrades, and third-party attack toolkit use with ADAudit Plus
  • 20. An attempt to create a PS remote session to remotely execute commands Often, a first step in PSRemote attacks: enabling remoting within PowerShell A PowerShell version downgrade attempt to enable an earlier version of PS that lacks essential security features Invoking a third party tool (Mimikatz) for post-exploitation activities
  • 21. Set up customized PowerShell alerts with ADAudit Plus
  • 22. Instant PowerShell-based alerts Set threshold- based alerts Granularly filter alerts based on various parameters Instantly notify the admin/take corrective action
  • 23. PowerShell-based attacks are on the rise. It is crucial to have a bird’s-eye view of all PowerShell-based activities and a strong 24x7 defense mechanism
  • 24. Stay alert with Abhilash Mamidela abi@manageengine.com Get your free trial!