ok gang! i know @ZephrFish has made some awesome content on CVE-2020-1472 but i think its time to get some more focus on this shizzle! to the @pwnDefend LAB! *plays batman sounds*
lab hypervisors go bRRRRRRRRRRRRRRR (if u know what i'm talking about patch ur shit people)
ok right that's deployed! let's get some attacker shizzle down!
ok so we're are installing ADDS and we are going to promote this vm to be a domain controller!
now to configre ADDS new forest!
ok so here's our hospital lab domain controller :(
we are gonna protect the fuck out of this place but we need to show how to detect the vuln first! #FuckRansomware
Nothing more Kermie Hax likes than protecting all the things! He hates crims who hit hospitals! 🐸🤬🤬🤬
ok kettle on, we are just gonna deploy a windows 10 vm as a sysadmin machine. Then we are going to get the AMAZING tool PINGCASTLE so we can discover all the things!
whilst we sort that out let's talk about intial access quickly! now you all know i love/hate RDP initial access vectors! but for a change I'm going to talk about phishing! its about 50/50 these days on ransomware vector RDP vs PHISH!
now we've already got a range of fuckup, our SPF isn't configured, DMARC missing and our mail filters/security is weak (not to say a nicely encrypted zip won't get us in etc.)
we are also missing alot of secure configuraiton on the endpoints! this is not a good place to be!
ok we've got a windows 10 enterprise latest build deploying.
now looking at RYUK IOCs etc. your gonna see lure's with PDFs possible hosted on google docs. so again more defence prep with awareness training (but that's no silver bullet)
hahaha how many times do i see this ;) but labs need to be FRESH!
ok i'm nearly ready for the main event :)
so from out domain joined workstation (might work non domain joined as well but not got time to check) we are going to run PINGCASTLE and on the main menu we can see OPTION 4 - Scanner
now we have option g - zerologon
now we need to select the domain: hospital.pwndefend.local
and pew pew! now remember this might be picked up by an IPS/IDS/HIDS or AV so only run this if you have AUTHORISATION.
so we open the report ad_scanner_zerologon file
and we can see here our srvukdc001 domain controller is vulnerable! we need to patch that!
So get your assess over to https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472 and get the patches! remember you need to raise a change request/follow process but when i used to manage a large estate I would have phoned the responsible director and this would be getting rolled out fast as fuck (test first)
I can't stress this enough! I'm going to do more on AD security and protecting against ransomware! hopefully @Shadow0pz are going to find time to film/steam some stuff! we can watch John pwn me in the lab then me go all blue and try stop his ass from breaching my servers :P
You can follow @UK_Daniel_Card.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: