Privilege Escalation & Man-in-the-Middle

  • Privilege Escalation

    • Gain access to what you should not be able to access.

    • Start as a normal user, and grant yourself more permissions

    • Inject code into a “privileged” app or service

    • Sudo / “Run as administrator”. Built in privilege escalation.

    • Mitigation?

      • Passwords, MFA, least privilege, sanitize input, patching, change default credentials

  • Pass the hash attack

    • Once captured, present the hash value instead of the password.

    • Older versions of Windows (LM hashes)

    • Newer versions with backwards-compatible configurations

  • Golden Ticket

    • One ticket to rule them all

    • Applies to Kerberos

    • Can grant Admin permissions to AD

    • On vulnerable versions, dumping the AD data store (NTDS.DIT) reveals the krbtgt hashes

    • These hashes can be used to create a “golden ticket” for any user in AD

    • “Kerberoasting”

  • Man in the middle attack

    • Network traffic interception. Optional redirection

    • Software: code injection. Man in the browser.

    • Keyloggers

    • ARP poisoning

  • DNS Attacks

    • Buffer overflows

    • DNS amplification

    • Mitigation?

      • Patching

      • Block malicious sources

  • Rootkits

    • Kernel level malware

    • Replaces OS files with malicious ones

    • Require root access

    • Mitigation: antivirus. File integrity monitoring.

    • Tripwire – File integrity monitoring for Linux.

    • File-sight for Windows FIM.

Last updated