Dark Mode

    Free Trial
    Image of Evyatar Beni
    • 2 min read
    • Aug 9, 2020 11:12:30 AM

    Simple Steps To Stop Privilege Escalation from Moving Laterally

    endpoints safe - Group Policy

    In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can do to quickly close your exposure when such caching is found. 

    If you are locally storing credentials, hackers can easily reveal the hash using Mimikatz. Then, the attacker can use the “pass the hash” technique to gain access to remote machines and services.

    Grinding the attack to a stop

    Here' how the attack path breaks down and what you can do to stop it: 

    • Mimikatz and similar tools are only able to access the credential hashes when run as a privileged user such as a local administrator.

    Mitigation action: minimize privileged user access where possible.

    • Microsoft desktops and servers have a configuration known as the Debug Privilege.  This is a security policy setting that allows users to attach a debugger to a process or to the kernel.
      For example, with debug privilege, one can silently remove all the security agents installed on a device, without raising any alert.On many versions of Windows, including Windows 10, Debug Privilege is assigned to the Built-in Administrators group by default!
      That is a great power in the hands of whoever wants to spread their ransomware in your organization.

    Mitigation action: Apply GPO and revoke the debug privilege from all users:

    Group Policy Management Editor → Windows Settings →  Security Settings → Local Policies → User Rights Assignment → Debug programs → Define these policy settings → Leave the box empty and press OK

    Think like a hacker to beat the hacker

    When an attacker gains a privilege escalation on one of your endpoints, it’s already bad news. They will then try to leverage that power for making a lateral movement inside your network and take over additional workstations and servers.

    Still, by applying the right practices on your endpoints, the attacker’s chances are slim.

    GYTPOL always monitors and reports on all endpoints in your organization.  We can tell if the debug privilege is not secured properly including whether the policy has also been successfully applied.

    About Author

    Image of Evyatar Beni

    Evyatar Beni

    A proven leader, Evyatar brings over a decade of experience in Customer Success & Cyber Strategy. Previously, Evyatar led Technical Account Managers at Claroty; before which he filled several distinguished tech roles in the Intelligence Services.

    Comments