Hacking Active Directory is most often associated with the process of elevating domain user access to domain admin access. Monitoring domain controller events can help identify when this process has started.
The first phase of any attack is reconnaissance. The attacker must learn about the environment to identify high-value targets. For Active Directory, this starts with LDAP queries.
StealthINTERCEPT has built-in policies for monitoring LDAP queries to determine if an attacker has started to map out members of privileged accounts—or even service accounts based on SPNs. Identifying where the queries originate, and what account is making these queries, is the first step in detecting potential threats against Active Directory.
Once the attacker has identified a potential target, an authentication attack may be used to try and obtain access to the target account. StealthINTERCEPT has built-in analytics that monitor for authentication-based attacks suck as Golden Tickets and Brute Force attacks, as well authentication conditions such as concurrent logins and impersonations.
It’s important to identify accounts that are getting locked out or have unusual activity.
Answering these questions helps identify the compromised machine and accounts that are trying to gain access or escalate privileges.
StealthINTERCEPT: Real-time Change & Access Monitoring for Identifying Threats
StealthINTERCEPT is an agent-based solution that sends activity alerts in real-time to Security Information and Event Management (SIEM) solutions and security administrators to alert on various threat types. It does not utilize native logging on domain controllers to identify these threats, so attackers cannot cover their tracks.
By monitoring for the beginning stages of Active Directory attacks, the potential threats can be eliminated before they gain access to other resources secured by Active Directory.
To learn more about how StealthINTERCEPT protects against Active Directory Attacks, please click here.
Spencer Stewart is a Senior Presales Engineer at STEALTHbits Technologies with over 17 years of professional IT experience and nine years in the regulated insurance and banking industries. Stewart is a highly certified Microsoft expert with a proven track record of driving results for clients of all sizes. He specializes in Microsoft Exchange/Active Directory architecture design, migration, and assessment.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply