In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can do to quickly close your exposure when such caching is found.
If you are locally storing credentials, hackers can easily reveal the hash using Mimikatz. Then, the attacker can use the “pass the hash” technique to gain access to remote machines and services.
Here' how the attack path breaks down and what you can do to stop it:
Mitigation action: minimize privileged user access where possible.
Mitigation action: Apply GPO and revoke the debug privilege from all users:
Group Policy Management Editor → Windows Settings → Security Settings → Local Policies → User Rights Assignment → Debug programs → Define these policy settings → Leave the box empty and press OK
When an attacker gains a privilege escalation on one of your endpoints, it’s already bad news. They will then try to leverage that power for making a lateral movement inside your network and take over additional workstations and servers.
Still, by applying the right practices on your endpoints, the attacker’s chances are slim.
GYTPOL always monitors and reports on all endpoints in your organization. We can tell if the debug privilege is not secured properly including whether the policy has also been successfully applied.