elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.97k stars 501 forks source link

[Meta] Explore Detection Opportunities on Active Directory Default Groups Abuse #3005

Closed w0rk3r closed 4 months ago

w0rk3r commented 1 year ago

Summary

Explore how attackers abuse default groups (DnsAdmins, Schema Admins, Server Operators, Backup Operators, etc.) to elevate privileges, maintain persistence, and execute payloads in domain servers and hosts,

### Tasks
- [x] Lab Creation
- [x] Undestand default domain groups and their privileges
- [x] Read, read, and read blog posts that explain the abuse of the privileges
- [x] Simulate abuse based on existing research
- [x] Detection Development

Goals

Resources:

https://adsecurity.org/?p=3700 https://cube0x0.github.io/Pocing-Beyond-DA/ https://adsecurity.org/?p=4064 https://github.com/gtworek/PSBits/tree/master/ServerLevelPluginDll

PRs

botelastic[bot] commented 1 year ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

w0rk3r commented 4 months ago

Closing this one as the scoped work is completed.