In today’s complex digital landscape, the importance of configuration security a...
The Cached Credentials Saga: Alls Well That Ends Well
When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage. This normally happens unnoticed as the platform trusts the user who has successfully been authenticated. Once authenticated, hackers can exploit other common weaknesses caused through misconfiguration and ultimately gain full domain admin access. This is a common attack technique and a challenge for organizations to detect and respond.
The problem
In a Microsoft Windows environment, credentials are cached on the endpoint. This is sometimes known as cached logon data. This cached information is encrypted using a complex hash known as DCC2 (Domain Cached Credentials version 2). Attempts to decrypt the cache would take far too long, instead a hacking technique known as pass the hash is used.
This technique uses the encrypted NTLM hash of the cache credential to authenticate with the remote server in order to gain access. The attacker does not require to know the plain text password to become authenticated. This is a well-known weakness in the implementation of the authentication protocol because the password hash itself is static between sessions until the password is changed.
The solution
To help overcome this weakness, Microsoft introduced Credential Guard for Windows 10 operating system (Enterprise edition only). The solution uses a virtualization-based isolation technology which prevents attackers from stealing the hashed credentials.
The fall short
However, there are several ways hackers are able to bypass this mechanism such as: keylogging, the Internal Monologue attack or with admin rights, you can install an alternative Security Support Provider.
The fallback
An alternative method is to use other mechanisms that will not cache the credentials such as Windows Hello or Smart Card authentication. However both of these are not popular choices within organizations from an operational standpoint.
Organizations that perform pen testing activities either themselves or by a cybersecurity specialist company should check for the existence of cached credentials. An open-source application called Mimikatz is commonly used to identify them. Whilst this will “do the job”, there are some disadvantages of taking this approach.
The sticking point
For most organizations, a pen test is only performed once or twice a year often due to the high cost, people resource time and disruption it causes to the platform. Yet, an attack based on pass the hash can happen at any time, therefore it is something which should be monitored constantly.
Pen Tests are normally performed on a small subset of endpoints of an organization, yet the exploitation of cached credentials is a high risk on all endpoints and users in an organization. Operationally, it would be nearly impossible to run Mimikatz on all endpoints. Not only would it be very time consuming, it would impact productivity of the organization.
The savior
One of the key benefits of GYTPOL is that we provide continuous monitoring of configuration security risks of all endpoint in the organization. This includes the identification of cached credentials which could be exploited as explained in this article.
SecOps and IT Admins now have total visibility of configuration security risks in their organization. Also, with the help of the GYTPOL auto-remediation feature, the risk can be neutralized immediately without any interruption to the employee whether they are connected to the network or working from home remotely.
About Author
Evyatar Beni
A proven leader, Evyatar brings over a decade of experience in Customer Success & Cyber Strategy. Previously, Evyatar led Technical Account Managers at Claroty; before which he filled several distinguished tech roles in the Intelligence Services.
Subscribe to
our Newsletter
We are ready to help you until and unless you find the right ladder to success.
Related Posts
Join over 25,000 in beating the failure of strategies by following our blog.
In evaluating endpoint posture and network integrity, configuration audits are e...
6 minute read
Endpoint configurations are essential to good security. That’s always been the c...
6 minute read
Device configurations are one of the most important elements of your organizatio...
Comments