diff --git "a/59AyT4oBgHgl3EQfQfYL/content/tmp_files/load_file.txt" "b/59AyT4oBgHgl3EQfQfYL/content/tmp_files/load_file.txt" new file mode 100644--- /dev/null +++ "b/59AyT4oBgHgl3EQfQfYL/content/tmp_files/load_file.txt" @@ -0,0 +1,1149 @@ +filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf,len=1148 +page_content='Detecting Forged Kerberos Tickets in an Active Directory Environment Thomas Grippo, Hisham A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Kholidy State University of New York (SUNY) Polytechnic Institute, Network and Computer Security Department, Utica, NY USA grippot@sunypoly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='edu, hisham.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='kholidy@sunypoly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='edu Abstract- Active Directory is the most popular service to manage users and devices on the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Its widespread deployment in the corporate world has made it a popular target for threat actors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' While there are many attacks that target Active Directory and its authentication protocol Kerberos, ticket forgery attacks are among the most dangerous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' By exploiting weaknesses in Kerberos, attackers can craft their own tickets that allow them to gain unauthorized access to services on the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' These types of attacks are both dangerous and hard to detect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They may require a powerful centralized log collecting system to analyze Windows security logs across multiple services.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This would give additional visibility to be able to find these forged tickets in the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Index Terms: Kerberos, Microsoft Active Directory, Kerberos attacks, detecting Kerberos attacks I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' INTRODUCTION As the world becomes more reliant on technology, the impact of cyberattacks will continue to grow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Many people began to realize this in March of 2020 when the COVID-19 pandemic began.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This was an unprecedented time as the world faced widespread closures and whole economies came to a grinding halt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The dangers of this highly transmissible disease forced employers to send everyone home, and thus the work from home culture began to take off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This shift made people very dependent on their computers and a reliable Internet connection as they had to constantly attend meetings and Zoom calls from their couch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Relying on technology more than ever, companies and their employees could not afford to face the ramifications of a widespread cyber-breach and thus had to invest a lot of time and money into protecting the infrastructure that made these new workflows possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Two years later, another unprecedented event caused a greater focus on cybersecurity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In February of 2022, Russia began its invasion of Ukraine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Being how interconnected the major countries were in the world economy, nobody expected there to be another large-scale invasion such as this, and its effects were felt around the world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' More interestingly, it was the first major conflict where cyberwarfare became a prominent factor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' One DNS platform claimed that they blocked 10 times the normal number of malware attacks targeting people in Ukraine [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' There were also major disruptions in Internet traffic as Russia cut power in many Ukrainian cities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Due to the nature of cyberwarfare, individuals around the world also were able to play a part in the conflict, going after Russian infrastructure in support of Ukraine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Looking at the current state of the world, the importance of defending cyberspace is becoming clearer to everyone.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Modern assets will continue to thrive on the Internet, and for them to function properly they must be defended.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is true for any asset whether it be government or corporate-owned.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' One of the biggest issues many organizations face is managing all the assets they have on the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To help solve this, Windows Active Directory is employed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Windows Active Directory, or AD for short, is a directory service that provides methods to store directory data and make it available to network users and administrators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This directory data can be any information about a certain object such as a user or service [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In essence, Active Directory acts as a centralized database for all the users and services that exist within a network, and it is invaluable for administrators managing this environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In fact, it is stated that over 90% of the Global Fortune 1000 companies, that is the top 1000 companies, use AD domain services [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' With such widespread dominance in the corporate world, Active Directory has become a target for many threat actors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Specifically, they have targeted AD’s default authentication service Kerberos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Kerberos is what allows users within an AD environment to access resources, and thus if it can be exploited by an attacker, that attacker would also be able to access such resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This can be very troubling because if an attacker can exploit the Kerberos protocol, they can easily pivot to any part of the network and maintain persistence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' That is why securing Active Directory, and detecting attacks within the environment should be a priority for IT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In this paper, we will be focusing on two different attacks on Kerberos, the Golden Ticket attack, and the Silver Ticket attack, which can be collectively referred to as forged Kerberos ticket attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' We will explore how these attacks function within a virtualized Active Directory environment, and more importantly how to detect them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The rest of this paper will be structured as follows: Section II will provide the necessary background information to understand this experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This will include an in- depth look at Windows Active Directory, Kerberos Authentication Services, and the Golden Ticket and Silver Ticket attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Section III will give an overview of the virtual environment that will be set up to carry out these experimental tests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Then, Section IV will walk through the operation of the Kerberos attacks within the virtual environment and how they can be detected.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Section V will go over the results of this experiment and discuss the potential impacts in the real world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Finally, Section VI will provide a conclusion to everything discussed in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' BACKGROUND This section will provide an overview of the background knowledge needed to understand the components of this experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Topics such as Windows Active Directory and the Kerberos Authentication Protocol will be explained in detail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Active Directory Domain Services As stated previously, almost all modern organizations are using Windows Active Directory to manage the users in their network, so it is important to understand this Microsoft product in depth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' At the very core of Active Directory lies the users and the computers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' People and their computers are what fundamentally make up a network, and in AD they will each have their own account.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Shown below in Figure 1 is an example user account in AD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 1: User Account in Active Directory The user login name is shown, as well as the domain that it belongs to which is grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Instead of individually assigning permissions to each user account, they can instead be added to security groups within AD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' These security groups can then be assigned specific permissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For every user account, we can see what security groups they are a part of under the Member Of tab shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' As shown, this user is part of the Domain Admins and Domain Users security groups, which are default groups created when Active Directory is configured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Each of these groups has a set of permissions defined that will apply to any users that are a part of the group.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' So for instance, this user will have all of the permissions of a Domain Admin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 2: Security Groups in Active Directory This streamlines the process of access control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For example, if a new employee gets hired within the accounting department, instead of manually assigning them all the permissions they need, you can simply add them to a custom accounting security group and they will inherit all of their permissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' So far we have user and computer accounts, as well as security groups to manage permissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' If you want to organize all of these accounts within Active Directory, you can create organizational units (OUs) or containers as shown in Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 3: OUs and Containers ActiveDirectory Users and Computers File Action View Help 7 一 Active Directory Users and Computers [Win!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Name Type Description SavedQueries _ADMINS Organizational.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' V grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com _USERS Organizational.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' _ADMINS Builtin USERS builtinDomain Computers Builtin Container Default container for up.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Domain Con.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Computers Organizational.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Default container for do.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Domain Controllers ForeignSecu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Container Default container for sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' ForeignSecurityPrincipals Managed Se.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Container Default container for ma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Managed Service Accounts Users Container Default container for up.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' UsersTomGrippoProperties ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Member Of Dialin Environment Sessions Remote control Remote Desktop Services Profile COM+ General Address Account Profile Telephones Organization User logon name: atgrippol @grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com V User logon name (pre-Windows 2000) GRIPPOT atgrippo Logon Hours.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Log On To.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Unlockaccount Account options: User must change password at next logon Usercannotchangepassword Passwordneverexpires Store password using reversibleencryption Account expires Never O End of: Saturday.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' April 30,2022 画Tom Grippo Properties ?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Remote control Remote Desktop Services Prfle COM+ GeneralAddress Account Organization Member Of Didlin Environment Sessions Member of: Name Active Directory Domain Services Folder Domain Admins gropot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com/Users Domain Users grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com/Users Add.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. Remove Pimary group: Domain Users Se Pimay Group you have Macintosh clents or POSIXcompliant There is no need to change Primary group unless applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' OK Cancel Apply Help In this screenshot, the containers are plain folders and the OUs are marked.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The main difference being that you can apply group policy to OUs but not to containers [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' So if you want to organize all of the users, you can create OUs based on the different departments within the company.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Taking a step back, all these objects discussed exist within a domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This can be seen in Figure 3, where all the OUs and containers, as well as the user and computer accounts that exist within them, belong to the grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The domain is controlled by the domain controller which is typically a Windows server.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The domain controller is where all the objects are stored and can be managed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For the purposes of this paper, this is all the information that is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It should be noted though, that Active Directory does not stop with domains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' There are also trees (a domain and its subdomains) as well as forests.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' However, this will not be relevant to the experiments in this paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Kerberos Another component of Active Directory is the Kerberos Authentication Protocol [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is what allows a user account to access a computer or resource within a domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It performs both authentication and authorization based on the permissions of the user account.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In an AD environment, the domain controller will act as the Key Distribution Center or KDC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The KDC is made up of the Authentication Service (AS), and the Ticket Granting Service (TGS).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Shown below in Figure 4 is an overview of the message exchange within Kerberos, we will use this diagram to analyze each step in the Kerberos protocol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In this example, we will say that a user is logging on to a desktop instead of accessing a server as shown in Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 4: Kerberos Message Exchanges [5] For a user to log on to a computer, they must enter their username and password.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Once they hit enter, the Kerberos message exchange will begin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' First, the client will send a KRB_AS_REQ to the AS on the KDC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This stands for Kerberos Authentication Service Request and is shown below in Figure 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 5: KRB_AS_REQ [6] This message will include the username, a timestamp encrypted with the user’s password, and the service principal name of the requested service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Since the user is requesting authentication, this will be the SPN of the krbtgt account, a default account within AD [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Once this message is sent to the KDC, it will look at the username inside the message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It will then retrieve the associated password key with that account and attempt to decrypt the timestamp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' If it can decrypt the timestamp, then the user’s identity has been proven and authenticated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It will also verify that the timestamp is not too old.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 6: KRB_AS_REP [6] The next message shown above in Figure 6 is the response of the KDC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Since the user sent the SPN of the krbtgt account in the prior message, it knows that the user wants a ticket-granting ticket (TGT).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This TGT acts as proof of authentication, and will be used to request tickets for specific services within AD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' As shown above, the TGT is encrypted with the hash of the krbtgt account, and it includes the username of the user, a session key that will be used for future message exchanges, the TGT expiration time, and the PAC which includes all the user’s permissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The KRB_AS_REP message also includes the username and the same session key which is encrypted with the user’s password key.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' When this message is received by the user, they will not be able to decrypt the TGT, but instead will make a copy and store it in memory for future use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They will be able to decrypt the rest of the message which includes a session key.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is a symmetric key that will be used to encrypt future messages to the KDC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' At this point, the user has successfully authenticated and has a TGT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Now they will use this TGT to get a service ticket for the computer they are trying to log in to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Timestamp User hash Username SPN krbtgt Usernonce(1)KRB_AS_REQ (2)KRB_AS_REP (3) KRB_TGS_REQ (4) KRB_TGS_REP Client KDC (6)KRB_AP_REP (5) KRB_AP_REQUsername TG Username Session key Session key TGTexpirationtime TGT expiration time Usernonce PAC krbtgt nash Userhash krbtgt hash Figure 7: KRB_TGS_REQ [6] Figure 7: KRB_TGS_REQ [6] First, they will send a ticket-granting service request or KRB_TGS_REQ to the KDC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Take note that the KDC is now acting as the TGS instead of the AS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The user will copy the TGT from RAM into the message as proof of their authentication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They will also place their username and timestamp, which will be encrypted with the session key that they received in the prior message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Also, the SPN of the computer they are attempting to log into will be placed inside the message unencrypted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' When the KDC receives this message, it will be able to decrypt the TGT with the krbtgt hash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Inside the TGT, it will retrieve the session key to decrypt the rest of the message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It will verify the timestamp and expiration time of the TGT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Then, it will begin to craft the KRB_TGS_REP message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 8: KRB_TGS_REP [6] The KDC will find the hash of the requested service based on the SPN in the prior message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It will then generate another session key that will be used in future communications between the client and the service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It will take the key, and the username with its associated permissions, and will encrypt it with the hash of the service account.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This will be the TGS ticket that the user uses to access the service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The KDC will also make another copy of the service session key for the user, which will be encrypted with the user’s hash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' When the user receives this message, they will copy the TGS ticket into RAM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They will also decrypt the rest of the message so that they can access the service session key.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' So far the user has authenticated with the KDC in order to get a TGT, and they used their TGT to get a TGS for the computer they are trying to access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Now they can begin to communicate with the computer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' First, they will send a KRB_AP_REQ message to the service, as shown below in Figure 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 9: KRB_AP_REQ [6] The TGS will be copied from RAM and placed inside the message along with the username and a timestamp which is encrypted with the service session key.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This message will then be sent to the service which in this case is the same computer the user is trying to log in to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' When the service receives this message, it will attempt to decrypt the TGS with its hash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' If it is successful, it knows that this ticket came from the KDC since the KDC, or domain controller is the only other server that has its hash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Inside the TGS, the service will retrieve the service session key to decrypt the rest of the message.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It will then check the username of the user and verify that they have valid permissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Recall that in the KRB_TGS_REP message, the KDC included the user’s permissions within the TGS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' After this verification step, the service will decide whether to grant the user access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Assuming it will, the service will send a KRB_AP_REP back to the user and they will be able to login to the computer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' After the user is logged into the computer, they can then access other resources within the Active Directory Domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Each time they want to access a different service, they will need to retrieve a TGS from the KDC and repeat the same process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Attacks on Kerberos Now that Active Directory and Kerberos have been explained, it will be easier to understand the various attacks against the Kerberos protocol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Since Kerberos is a secure protocol, many of these attacks are advanced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For the purposes of this paper, we will only be looking at two types of attacks, Golden Ticket, and Silver Ticket attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 1) Silver Ticket Attack: The Silver Ticket attack is when an attacker forges a TGS ticket.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For this to be successful, the attacker would need the password or NTLM service hash of the service account to be able to properly encrypt the TGS ticket [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They could then make up any session key they want to use, and Username TGS Service session key Service session key Username TGS expiration time TGS expiration time Usernonce PAC krbtgt nash Sessionkey service ownerhashTGS Serviceownerhash Username Timestamp ServicesessionkeyUsername Timestamp Sessionkey TGT krbtgt hash SPN User nonce add in the rest of the information inside the TGS ticket such as the expiration time and the PAC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For the PAC, ideally, the attacker would give themselves admin privileges so they can have full access to the service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 2) Golden Ticket Attack: The Golden Ticket attack is when an attacker forges the TGT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For this to be successful, the attacker would need the hash of the krbtgt account, which is much harder to acquire than any service account hash [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' However, if an attacker is successful, they can essentially impersonate the KDC and give themselves administrator rights to any service in the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This attack is extremely dangerous if successful, but it is harder to perform and noisier than the silver ticket attack.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' THE VIRTUAL ENVIRONMENT To see these Kerberos attacks in real-time and attempt to detect them, we will need to set up a virtual environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Shown in Figure 10 is a diagram of the environment that has been set up for this experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To keep things simple, there are only three systems in the grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com domain, the domain controller, a Windows 10 client, and a SQL server.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Then, there is the attacker machine which resides outside of the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Each of these systems will be explained in detail, as well as the role that they play within the Kerberos Authentication protocol and ticket forgery attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 10: The Virtual Environment This virtual environment was created using VirtualBox [8] as the hypervisor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' VirtualBox is a type-2 hypervisor, meaning that it runs as software on the host OS.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It can be downloaded from the website at https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='virtualbox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='org/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Each of the systems in this environment are running on separate VirtualBox VMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The domain controller (DC) is the most important system in the environment and serves many purposes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is a Windows Server 2019 machine with two network interface cards (NIC), critical for the functioning of this environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' These can be seen in Figure 11 below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 11: Network Interfaces for DC One of the NICs is connected to the Internet from the host machine running VirtualBox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The other NIC is internal and has a static IP address of 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='1 as shown above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The reason for the domain controller to have two NICs is because in this environment it is also acting as a router.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This means that not only is the domain controller running Windows Active Directory, but it is also routing traffic for all the other VMs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In order for this to be possible, the domain controller also must be running DNS and DHCP as shown in Figure 12, the Windows Server Manager.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 12: Windows Server Manager for DC Having these services configured, the DC will be able to dynamically assign IPv4 addresses within the scope as shown in Figure 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Internet grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Domain Controller Windows 10 SQL, Server MSSQLSVC Windows 10internal INTERNET grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Intel(R)PRO/1000MTDesktopAd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. Intel(R)PRO/1000MTDesktopAd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' internal Status X INTERNETStatus X Network Connection Details X Network ConnectionDetails X Network Connection Details Network Connection Details: Propety Value Property Value Connection-specific DN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Connection-specific DN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' sunyit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='edu Description Intel(R) PRO/1000 MT Desktop Adapter Description Intel(R) PRO/1000 MT Desktop Adapter Physical Address 08-00-27-8B-F4-6E Physical Address 08-00-27-F5-8A-56 DHCPEnabled No DHCP Enabled Yes IPv4 Address 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='1 IPv4 Address 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='15 IPv4 Subnet Mask 255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0 IPv4 Subnet Mask 255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0 IPv4 Default Gateway Lease Obtained Tuesday.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' March 22, 2022 7:44:03 AM IPv4 DNS Server Lease Expires Monday.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' April 4, 2022 9:35:04 AM IPv4 WINS Server IPv4 Default Gateway 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2 NetBIOS over Tcpip En.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Yes IPv4 DHCP Server 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2 Linklocal IPv6 Address fe80:60eb:bb05:d0a6:263f%12 IPv4 DNS Server IPv6 Default Gateway IPv4 WINS Server IPv6DNS Server NetBlOS over Tcpip En.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Yes ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='LinkHocal IPv6 Address ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='fe80:5121:99b7:761f:c69d%4 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='IPv6 Default Gateway ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='IPv6 DNS Server ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='A ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='< ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Close ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='CloseServerManagerDashboard ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='PA ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='lohVee ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='WELCOME TO SERVER MANAGER ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Loxal Senver ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='il Al Senves ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Configurethis local server ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='TIDHO ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='OUICX 1SAE ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='品ONS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2Add roles and features ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='o is ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='3Addotherservers tomanage ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='all Remote Acoist ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='WHATSAW ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='4Createaservergroup ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='5Connect this server to cloud services ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='ROLES AND SERVER GROUPS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='ADDS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='TDHCP ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='品DNS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='File and Storage ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='ervice ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Bos ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Managubity ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='①Manageabity ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='①Manageabity ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='①Marageabity ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Managabity ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='tvents ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='tvents ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='trents ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='tuentt ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Events ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Senicet ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Senices ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Senvicts ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Ferfomanor ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Pertomance ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Performanct ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Performance ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='BPA seuts ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='SPA resuls ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='BPA reuts ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='BPA results ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='BPA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='result dli Remote Access iliAllSeve ①Managebaty ①Managebity ①Manageabity Events Fvens Servces Eees Senvices Services Petomarce aunieyad BPA vsts IPA reults BPA reslts 4/3/2022 94) AM 4/3/9022 941.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='AM Figure 13: DHCP on DC It will also act as the DNS server for its clients, and it will be able to route traffic to the Internet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Most importantly, however, the DC is running Windows Active Directory, and will act as the KDC for Kerberos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is responsible for the grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com domain, which can be seen in Figure 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 14: The grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Domain The _ADMINS and _USERS organizational units were created for the experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' All the other containers were created by default when AD was configured on this server.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The next system in this environment is the Windows 10 client.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is simply a Windows 10 VM that is a part of the grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 15: Windows Client It has one internal NIC (Figure 15) that is connected to the domain controller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is the machine that will act as a legitimate user that wants to access the SQL server within the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The SQL server is another Windows Server 2019 machine with an internal NIC similar to the client.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 16: Microsoft SQL Server Management Studio It is running Microsoft SQL Server 2019 with Windows Authentication mode enabled to allow for Kerberos authentication for clients in the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Clients can connect to this SQL server either with the Microsoft SQL Server Management Studio as shown above in Figure 16, or they can use the sqlcmd utility to access it through a command-line interface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They will connect to the server through TCP 1433, which is the most common port for SQL.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is important to note that this service is not inherently vulnerable to ticket forgery attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is because of the default service account that runs the MSSQLsvc service.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 17: MSSQLsvc The Log on service account for MSSQLsvc must be changed for the SQL server to be vulnerable to ticket forgery attacks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' As shown in Figure 17, it has been changed to the SQLServiceAcc user in Active Directory, which has a weak password that we will be able to crack.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This means that TGS tickets for the SQL server will be encrypted with the password of the SQLServiceAcc’s password which is set to Password123.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Lastly, the attacker machine is running Windows 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is part of the local area network and is connected to the DC through its internal NIC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This could emulate an attacker who has gained access to the network, or an attacker who has compromised a Windows 10 machine within the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is the machine that will be used to forge Kerberos tickets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' EXPERIMENT An important point to understand about ticket forgery attacks in Active Directory is that they are a post-exploitation technique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This means that an attacker already has compromised a machine within the network and is looking to escalate their privileges Spot Verifier Verifies potential file syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Manual (Trig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Local System SQL Server (MSSQLSERVER) Provides storage, proces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Running Automatic SQLServiceAcc@grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com SQL Server Agent (MSSQLSER.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Executes jobs, monitors .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Manual NT Service SQLSERVERAGENT SQL Server Browser Provides SQL Server con.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Disabled Local Service SQL Server CEIP service (MSSQ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' CEIP service for Sql server Running Automatic NT Service SQLTELEMETRY : SQL Server VSS Writer Provides the interface to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Running Automatic Local SystemDHCP V v B IPv4 Scope [172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0] 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='100-200 Server Options Policies Filters IPv6Active Directory Users and Computers 口 X File Action View Help 1 Active Directory Users and Computers [Win!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Name Type Description Saved Queries E_ADMINS Organizational.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' V grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com _USERS Organizational.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' _ADMINS Builtin _USERS builtinDomain Computers Container Default container for up.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Builtin Domain Con.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Computers Organizational.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Default container for do.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Domain Controllers ForeignSecu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Container Default containerfor sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' ForeignSecurityPrincipals Managed Se.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Container Default container for ma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' ManagedServiceAccounts Users Container Default containerforup.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' UsersNetwork Connection Details: Property Value Connection-specific DN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Description Irntel(R) PRO/1000 MT Desktop Adapter Physical Address 08-00-27-63-EF-3F DHCPEnabled Yes IPv4 Address 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='100 IPv4 Subnet Mask 255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0 Lease Obtained Thursday.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' February 25, 1886 6:36:22 AM Lease Expires Monday.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' April 11, 2022 10:04:39 AM IPv4 Default Gateway 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='1 IPv4 DHCP Server 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='1 IPv4 DNS Server 172.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='1MicrosoftSQLServerManagementStudic File P3 View Tools Window Help NewQuery Execute ObjectExplorer Connect- SQLSERVER(SQLServer15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='5-GRIPPOT/a-tgrippo) Databases 田 Security Server Objects 田 Replication + PolyBase Always On High Availability 田 Management IntegrationServicesCatalogs SQLServer Agent (Agent XPs disabled) 田图XEventProfilerVerifies potential file syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. Manual (Trg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' LocalSystem QSQLServer(MSSQLSERVER) Provides storage, proces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Running Automatic SQLServiceAcc@grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Executes jobs, monitors .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Manual NTServiceiSQLSERVERAGENT O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='SQL Server Browser Provides SQL Server con.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Disabled LocalService Q SQL Server CEIP service (MSSQ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' CEIP servicefor Sql server Running Automatic NT Service)SQLTELEMETRY OSQLServer VSS Writer Provides the interfaceto.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Running Automatic Local System and pivot to other machines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For example, an attacker may exploit some vulnerability in a machine and create a reverse shell or command and control (C2) channel so that they can control it from their own machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' They would then look for other machines on the network that they can potentially access and attempt to forge Kerberos tickets to gain control over more resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The most popular tool for forging Kerberos tickets, and for Kerberos vulnerabilities in general, is Mimikatz [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is a popular open-source tool, that is used by both attackers and penetration testers to escalate privileges within a Windows network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is a post-exploitation tool that would typically have to be downloaded onto the compromised machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Alternatively, attackers who have established a meterpreter shell on the compromised host can use the Mimikatz script through Metasploit without having to download it on the disk of the host [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Given how popular Metasploit is, this is the most common workflow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This experiment is focused on the forged Kerberos tickets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Thus, we will not be going over any exploitation techniques with Metasploit or similar frameworks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Since we created this environment, we have the advantage of knowing all the credentials for the machines and controlling their security mechanisms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Leveraging this, we will skip over the initial exploitation phase, and get right into Mimikatz and forging Kerberos tickets using the Windows 10 attacker machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Silver Ticket Attack To review, the silver ticket attack involves forging a TGS ticket for a specific service in the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In this case, the MSSQLsvc service on the SQL server machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For this to be successful, an attacker would need the password or NTLM service hash of the service account to properly encrypt the TGS ticket.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To perform the attack, we will need to crack this hash to get the password so that we can use it to forge tickets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 1) Download the Mimikatz Tool: We will first download the Mimikatz tool from https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com/gentilkiwi/mimikatz/releases onto the attacker machine and extract the contents of the ZIP file.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The executable file \\x64\\mimikatz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='exe will be used to forge the TGS ticket.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is important to note that Windows Defender Antivirus will flag this download as malicious and must be disabled before downloading.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 2) Obtain the Service Account Password: To get the password of the service account that will be used to encrypt the TGS, an attacker would first need to steal a legitimate TGS ticket.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' There are several ways to do this such as sniffing the network traffic in the local area network and hoping that a legitimate user requests the TGS [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' For the simplicity of this lab, we will just take the real TGS ticket from the Windows 10 client machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Kerberos tickets are stored in a cache in memory and can be viewed with the klist command.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To extract these tickets from memory, we can use the Mimikatz command kerberos::list /export as shown in Figure 18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 18: Exporting Kerberos Tickets with Mimikatz The TGS ticket on the bottom is the one that we want.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' As seen above, it is for sqlserver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com in the GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM domain and used by the bross user account which is currently logged in to the Windows 10 client.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' It is encrypted with RC4 and is valid for 10 hours.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Mimikatz will store each of these tickets as files in the current working directory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' We can then copy the TGS ticket over to the attacker machine VM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Once the attacker has stolen the TGS ticket, they can then begin to crack the password used to encrypt the ticket through a technique called kerberoasting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Kerberoasting is a technique where an attacker attempts to brute force the password of a service account offline [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is possible because all the tickets in the domain are encrypted with the RC4 algorithm which is weaker than the default AES256.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 19: Local Group Policy Settings on Domain Controller The supported Kerberos encryption algorithms can be changed in the Local Group Policy Settings as shown in Figure 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This setting must be changed on all computers in the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To crack the hash, we will use the Kerberos tool kit which can be found on GitHub [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Specifically, O mimikatz 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0 x64 (oe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='eo) 00000000l- 8x00000017- rc4 hmac nt Start/End/MaxRenew:4/9/20227:48:44 AM:4/9/20225:48:44PM:4/16/20227:48:44AM Server Name :krbtgt/GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM @GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM client Name :brOss @ GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM Flags40e1000o :namecanonicalize;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='pre_authent ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' initial ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='renewable: forwardable saved to file : -4oe1oooo-bross@krbtgt-GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM-GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='kirbi x00900017-rc4hmacnt Start/End/MaxRenew:4/9/20229:33:10AM:4/9/20225:48:44PM:4/16/20227:48:44AM Server Name :Cifs/FileSERVER @ GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM client Name : bross @ GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM Flags 40a10000 : name_canonicalize;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='pre_authent:renewable:forwardable;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Saved to file :1-4oa1oooo-bross@cifs~FileSERVER-GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='kirbi [0000002]-ex0000017-rc4_hmac_nt Start/End/MaxRenew:4/9/2022 9:29:01 AM :4/9/20225:48:44 PM;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='4/16/20227:48:44 AM Server Name LDAP/WinServer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com/grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com @ GRIPPoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='coM client Name : bross @ GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM Flags 40a50000 name canonicalize okas_delegate:pre authent ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' renewable;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' forwardable saved to file : 2-4oa5oooo-bross@LDAPWinServer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='comrgrippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com-GRIPpoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='cOM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='kirbi 000000031-0x0000017-rc4hmacnt Start/End/MaxRenew:4/9/20227:48:44AM:4/9/20225:48:44PM:4/16/20227:48:44AM Server Name MSsQLSvc/sqlserver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com:1433 @ GRIPPoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='cOM client Name : brOss @ GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM Flags 40a10000 :name_canonicalize;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' pre_authent: renewable: forwardable: Saved to file :3-4a1oooo-bross@M5sQLSvc~sqlserver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com1433-GRIPPoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='coM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='kirbi mimikatz #Local GroupPolicy Editor File Action VEW Help LocalComputerPolicy Policy Security Setting vComputerConfiguration Network access: Remotely accessible registry paths and sub.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Software Settings System/CurrentControls.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Windows Settings Network access: Restrict anonymous accessto Named Pipes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Enabled Network access: Restrict clients allowed to make remote call.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Not Defined NameResolution Policy Scripts (Startup/Shutdown) Network access: Shares that can be accessed anonymously Not Defined Deployed Printers Network access: Sharing and security model for local accou.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Classic - local users auth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. Security Settings Network security: Allow Local System to use computer ident.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Not Defined Account Policies Network security: Allow LocalSystem NULL session fallback Not Defined aLocal Policies Network security: Allow PKU2U authentication requests to t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Not Defined aAudit Policy Networksecurity:Configure encryption types allowedforKe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='RC4_HMAC_MD5 User Rights Assignment Network security:DonotstoreLAN Managerhashvalueon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Enabled Security Options Network security: Force logoff when logon hours expire Disabled WindowsDefenderFirewall Network security:LAN Managerauthenticationlevel Not Defined Network List Manager Polici Network security: LDAP client signing requirements Negotiate signing Public Key Policies Networksecurity:MinimumsessionsecurityforNTLMSSP.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Require 128-bit encrypti.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Software Restriction Policies Network security: Minimum session security for NTLM SSP .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Require 128-bit encrypti.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. Application Control Policies Network security: Restrict NTLM: Add remote server excepti.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Not Defined ,IPSecurityPolicieson Local Network security: Restrict NTLM: Add server exceptions in t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Not Defined Advanced Audit Policy Conf Network security: Restrict NTLM: Audit Incoming NTLM Tra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Not Defined Policy-based Qos Network security: Restrict NTLM:Audit NTLM authenticatio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='Not Defined the tgsrepcrack.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='py program will be used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The command to do this is shown below in Figure 20.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 20: Kerberoasting the Hash We give the program a custom wordlist that contains several common passwords to use.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' One of which is the correct password, Password123.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' We also supply the program with the legitimate TGS ticket that was stolen from the Windows 10 client machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' As seen in the screenshot, the password was successfully cracked and is displayed on the screen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 3) Forge the TGS Ticket: Now that we have the password for the SQLServiceAcc user, which is running the MSSQLsvc service, we can begin to forge the silver ticket.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Mimikatz will be used to do this, which has been downloaded onto the attacker machine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To forge a silver ticket, Mimikatz requires several arguments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' First, you need the SID or security identifier of the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is a string that is unique to the domain [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Each user account in Active Directory is identified by their SID with a RID or relative identifier concatenated at the end.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Mimikatz will also need the name of the domain, the fully qualified domain name (FQDN) of the target, the name of the target’s service, the RC4 hash of the password, and the name of the user to impersonate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 21: Creating the Silver Ticket The full command is shown above in Figure 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Mimikatz has successfully created the forged TGS ticket for the bross user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' As specified by the /ptt option, Mimikatz has automatically stored the ticket in the Kerberos cache in memory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 4) Access the SQL Server: With the TGS ticket in the cache, the attacker machine can now access the MSSQLsvc as the bross user.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 22: Successful Authentication to MSSQLsvc Using the sqlcmd S SQLServer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com command, the attacker can successfully access the MSSQLsvc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' In Figure 22, the SQL query shows that the service believes the logged-in user is bross.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' The forged TGS ticket is also shown above using the klist command.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Golden Ticket Attack Instead of the TGS ticket, the golden ticket attack aims to forge the TGT ticket.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' With a valid TGT ticket for a user with elevated privileges, an attacker can have great control over the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' While this attack is more dangerous than the silver ticket attack, it is harder to perform in the real world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is because an attacker would need to obtain the krbtgt account’s NTLM hash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This would involve compromising an account with elevated privileges in order to dump hashes of accounts within the domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' To see this attack in action, we will use the domain controller at WinServer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com, the Windows 10 client, and the Windows 10 attacker machine which is not a part of the grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' 1) Obtain the krbtgt NTLM Hash: We will be using the Mimikatz tool to obtain the krbtgt NTLM hash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Mimikatz has a dcsync command that takes advantage of the Directory Replication Service Remote Protocol, or MS-DRSR [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' This is a service used for communication between domains so that they can replicate information between each other [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' By using the dcsync command in Mimikatz, we are essentially pretending to be a domain controller, and asking for the password data of the krbtgt account.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' However, for this to be possible, we need the proper permissions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Figure 23: Replicating Directory Changes Permission 口 X File Home Share View > This PC > Downloads > Search Downloads A Name Date modified Type Size ★Quickaccess Desktop VToday (3) Downloads 3-40a1000-bross@M5SQLSvc_sqlserver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. 4/9/2022 9:40 AM KIRBI File 2KB Documents attack_details 4/9/2022 9:27 AM Text Document 1KB kerberoast-master 4/9/2022 9:44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='AM Filefolder Windows PowerShell server.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='con_1433-GRIPpoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='coH.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content="kirbi USEHASHCAT,IT'SHELLAFASTER!" metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' !' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' racking1tickets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' foundpasswordfor ticket e:Password123 File:.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='13-4ea1eeee-bross@MSSQLSvc_sqlserver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com_1433-GRIPPoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='CoM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='kirbs C:\\Users\\attacker/Downloads>@mimikatz 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='0x54 (oe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='eo) X #####, mimikatz2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='e(x64)#19041Aug102021e2:01:23 La Vie, A L\'Anour" (oe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='eo) 抽#/ 排# >https://blog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='gentilkiwi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com/mimikatz Benjamin DELPY gentilkiwi (benjamin@gentilkiwi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com) ##V# Vincent LE TOUX vincent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='letouxegnail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com) mimikatz#kerberos::golden/sid:5-1-5-21-3521637253-38211e3896-1122387918/domain:GRIPPoT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='coM/ptt/id:5es/target:SQL erver.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com/service:MSSQLsvc/rc4:58A478135A93Ac3BF058A5EAeE8FDB71/user:bross User bross Domain GRIPPOT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='COM(GRIPPOT) SID S-1-5-21-3521637253-3821103896-1122387918 User Id roups 506 Id 58a478135a93ac3bfe58a5eaee8fdb71-rc4_hmac_nt 513512529.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='518.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='519 ServiceKey: Service MSSOLSVC Target SQLServer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Lifetime Ticket : 4/9/202210:45:31 AM: /4/6/2932 10:45:31AM:4/6/203210:45:31AM Pass The Ticket PAC PAC generated signed EncTicketPart generated EncTicketPart KrbCred generated encrypted nimikatzVgrippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com Advanced Security Settings forgrippot _ADMINS _USERS Owner: Administrators(GRIPPOT/Administrators)Change Computers Domain Controllers Permissions Auding Effective Access ForeignSecurityPrina Keys Foraditionalinfmation,doubeclickamissinntryTmfymsnentry,tthntyandclickEdit(ifvailae) LostAndFound Managed Service Ad Permission entries: Program Data Type Principal Access Inhe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Appliesto System Allow Cloneable Domain Controllers (.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. AllowaDCto createacloneof it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' None This object only Users &Allow Enterprise Read-only Domain C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content=' Replicating Directory Changes None This object only NTDS Quotas ZAllow Allow DomainControllers (GRIPPOTAD Replicating Divectory Changes Replicating DirectoryChanges All None This object only TPM Devices Tom Grippo (a-tgrippo@grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='. None This object andalldescendan Command Prompt - sqlcmd -S SQLServer-grippot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/59AyT4oBgHgl3EQfQfYL/content/2301.00044v1.pdf'} +page_content='com - SQLCMD X CurrentLogonIdise:ex14925b Cached Tickets: (1)