CONFIDENTIAL INFORMATION
MORE zBANG FOR THE zBUCK
1
How zBang Can Be Used to Discover Hidden Risks
Andy Thompson – Customer Success
CONFIDENTIAL INFORMATION
• National Manager – Customer Success
• Dallas, TX
• Husband
• Father
• Road-warrior
WHOAMI
2
CONFIDENTIAL INFORMATION 3
If I have seen further than others it is by
standing upon the shoulders of giants.
- Isaac Newton
CONFIDENTIAL INFORMATION 4
HIDDEN RISKS
CONFIDENTIAL INFORMATION
•Hidden Risks
•Shadow Admins
•Skeleton Key Attacks
•SID History
•Risky SPN’s
•zBang!
AGENDA
5
CONFIDENTIAL INFORMATION 6
SHADOW ADMINS
CONFIDENTIAL INFORMATION
Overlooked privileged accounts.
• Not members of a privileged Active Directory Group.
• Privileges granted through the direct assignment of permissions
using ACLs on AD Objects.
SHADOW
ADMINS
7https://www.cyberark.com/threat-research-blog/shadow-admins-stealthy-accounts-fear/
CONFIDENTIAL INFORMATION
DEMONSTRATION
8
Normal user can’t access
ms-mcs-AdmPwd
FAIL!
CONFIDENTIAL INFORMATION
DEMONSTRATION
9
Privileged attacker adds
backdoor to Servers OU
CONFIDENTIAL INFORMATION
DEMONSTRATION
10
Domain user can access AdmPwd!
LAPS cmdlet doesn’t detect it!
SUCCESS!
CONFIDENTIAL INFORMATION
An ACE up the sleeve
11
Designing Active Directory DACL Backdoors
Andy Robbins & Will Schroder
SpectreOps
CONFIDENTIAL INFORMATION
• Prevention:
• None. Pretty much your only hope for performing “forensics” on these actions.
• If you weren’t collecting logs when backdoored, you may never know who the perp was :(
• Detection
• Proper event log tuning and monitoring
• Pro-Tip: Event log 4738 (“A user account was changed”), filtered by the property modified.
• Replication Metadata
• Points you in the right direction, but you still need full logs.
• System Access Control Lists (SALC’s)
• Contain entries that, “specify access attempts and generate audit records in the event log of a
domain controller”.
• More info at http://bit.ly/2tOAGn7
MITIGATION TECHNIQUES
12
CONFIDENTIAL INFORMATION
Allows the organization to review privileged accounts that might
not be part of the organizations' known privileged groups but still
may have sensitive permissions.
https://github.com/cyberark/ACLight
Developed by Asaf Hecht
@HechtovZBANG
ACLIGHT
13
CONFIDENTIAL INFORMATION 14
SKELETON KEY
CONFIDENTIAL INFORMATION
• Discovered in the wild – Jan 2015.
• Bypasses authentication on Active Directory (AD) systems.
• Threat actors can authenticate as any user.
• Does not generate network traffic.
• Network Intrusion Protection is USELESS!
SKELETON KEY
MALWARE
15
CONFIDENTIAL INFORMATION
• Deployed as in-memory patch on victim’s AD Domain Controller.
• Downgrades encryption from AES128|256 to RC4
• Affects DC Replication
• Lacks persistence!
SKELETON KEY
MALWARE
16
CONFIDENTIAL INFORMATION
DEMONSTRATION
17
Running Mimikatz
CONFIDENTIAL INFORMATION
DEMONSTRATION
18
Running Mimikatz
CONFIDENTIAL INFORMATION
• Enable Multi-Factor Authentication
• Isolate critical infrastructure
• Limit Privileged User Accounts.
MITIGATION TECHNIQUES
19
CONFIDENTIAL INFORMATION
Queries all DC’s in forest and tries to connect
through Kerberos with AES256 encryption.
ZBANG
SKELETON
KEY SCAN
20
If DC is running the correct functional level and not
supporting AES256 encryption, it might be infected.
CONFIDENTIAL INFORMATION 21
SID HISTORY
CONFIDENTIAL INFORMATION
• Attribute that can be used in case of migration of an account
between two trusted domains.
• The attribute can be manipulated by attackers to escalate
privileges.
SID
HISTORY
22
SID: 5-1-5-21-1583770191-1400084446-32828441-3103 SID: 3-2-6-49-1547894215-1597538462-15985214-1541
SID: 3-2-6-49-1547894215-1597538462-15985214-1541
SIDHISTORY: 3-2-6-49-1547894215-1234567890-98765432-1351
SIDHISTORY: 5-1-5-21-1583770191-1400084446-32828441-3103
CONFIDENTIAL INFORMATION
PRIVILEGED
SIDS
23
Name SID
Administrator S-1-5-21 Domain – 500
KRBTGT S-1-5-21 Domain - 502
Enterprise Domain Controllers S-1-5-9
Domain Admins S-1-5-21 Domain - 512
Domain Controllers S-1-5-21 Domain - 516
Schema Admins S-1-5-21 Domain - 518
Enterprise Admins S-1-5-21 Domain - 519
Group Policy Creator Owners S-1-5-21 Domain - 520
Administrators S-1-5-32-544
Account Operators S-1-5-32-548
Server Operators S-1-5-32-549
Print Operators S-1-5-32-550
Backup Operators S-1-5-32-551
Replicators S-1-5-32-552
Event Log Readers S-1-5-32-573
CONFIDENTIAL INFORMATION
DEMONSTRATION
24
Adding Domain Admin rights
within SID History
CONFIDENTIAL INFORMATION
DEMONSTRATION
25
User now has
Domain Admin Rights.
CONFIDENTIAL INFORMATION
DEMONSTRATION
26
Dump KRBTGT (Golden Ticket)
CONFIDENTIAL INFORMATION
• Enumerate all users with data in the SID History attribute which include SIDs in the same domain.
• If users haven’t been migrated, search for all users with data with the SIDHistory attribute.
DETECTION TECHNIQUES
27
# Detect Same Domain SID History
Import-Module ActiveDirectory
[string]$DomainSID = ( (Get-ADDomain).DomainSID.Value )
Get-ADUser -Filter “SIDHistory -Like ‘*'” -Properties SIDHistory | `
Where { $_.SIDHistory -Like “$DomainSID-*” }
Domain Controller Events:
• 4765: SID History was added to an account.
• 4766: An attempt to add SID History to an account failed.
CONFIDENTIAL INFORMATION
ZBANG
SID
HISTORY
SCAN
28
CONFIDENTIAL INFORMATION 29
RISKY SPNS
CONFIDENTIAL INFORMATION
• SPN is a unique identifier of a service instance.
• Used by Kerberos to associate a service instance to a service
logon account.
• Computer
• User
• Stored in Active Directory…Whether it exists or not!
RISKY
SPN’S
30
CONFIDENTIAL INFORMATION 31
CONFIDENTIAL INFORMATION 32
Attacking Kerberos:
Kicking the Guard Dog of Hades
Tim Medin
SANS Hackfest 2014
CONFIDENTIAL INFORMATION
DEMONSTRATION
33
Search for Vulnerable SPN’s
CONFIDENTIAL INFORMATION
DEMONSTRATION
34
Request Kerberos Ticket for SPN
CONFIDENTIAL INFORMATION
DEMONSTRATION
35
Brute-force the Kerberos Ticket
CONFIDENTIAL INFORMATION
DEMONSTRATION
36
In a single command…
PS C:> Find-PotentiallyCrackableAccounts -
Sensitive -Stealth -GetSPNs | Get-TGSCipher -
Format "Hashcat" | Out-File crack.txt |
Hashcat64.exe -m 13100 crack.txt -a 3
CONFIDENTIAL INFORMATION
• Delete unused SPN’s, disable unused accounts.
• Often overlooked.
• Avoid Dual-accounts.
• Used by both human users and services.
• Strengthen encryption types. Switch to AES
• Least Privileged approach.
• Consider local accounts, computer accounts, virtual, or ephemeral accounts.
• Rotated, random, and complex credentials.
• Use an automated system, or at least employ managed service accounts.
• Avoid hardcoded credentials – use credentials management. (AIM/Conjur)
• Monitor usage of privileged accounts.
• Specific useage of service accounts
• Large quantities of Service Ticket requests (Event ID 4769)
MITIGATION TECHNIQUES
37
CONFIDENTIAL INFORMATION
Scans the domain controller for deployed services
running with high privileged human accounts.
ZBANG
RISKYSPN
38
Those services can be targeted by infiltrating attacker to
extract credentials utilize the privileged account for
malicious purposes.
CONFIDENTIAL INFORMATION
SPN DELEGATION
39
• Services and Service Accounts can
introduce more risk than you think.
• Service Delegation is abused for
PrivEsc and RCE
• Matan Hart @MachoSec
CONFIDENTIAL INFORMATION
MYSTIQUE
40
Queries the Active Directory for accounts that are trusted for
delegation (Unconstrained, Constrained and Protocol Transition).
https://github.com/machosec/Mystique
Identifies risky Kerberos delegation configurations.
CONFIDENTIAL INFORMATION
The zBang tool suite was developed by
CyberArk Labs to allow organizations a
quick detection of recent dangerous risks
and vulnerabilities exploited by attackers.
This FREE tool suite will detect risks and
potential attacks in your network.zBANG
41
Typical Execution (1000 machines) = Roughly 7-10 min.
CONFIDENTIAL INFORMATION
• Powershell v3+ and .NET 4.5
• (Default in Windows 8/2012+)
• Run the tool from a domain joined machine.
• Run it with any domain user account.
• Only Read-Only queries to the DC.
SYSTEM
REQUIREMENTS
42
CONFIDENTIAL INFORMATION
•Run it today!
• Reach out to your local CS Advisor!
•Deeper Audits available too!
WANT MORE ZBANG?!
43
CONFIDENTIAL INFORMATION
•Hidden Risks
•Shadow Admins
•Skeleton Key Attacks
•SID History
•Risky SPN’s
•zBang!
SUMMARY
44
CONFIDENTIAL INFORMATION 45
THANK zYOU!

More Related Content

PDF
The Shifting Landscape of PoS MalwareOutput
PPTX
Conclusions from Tracking Server Attacks at Scale
PDF
201504 securing cassandraanddse
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
Getting Started in Blockchain Security and Smart Contract Auditing
PDF
ATT&CKING Containers in The Cloud
PDF
Automation Patterns for Scalable Secret Management
PDF
When Insiders ATT&CK!
The Shifting Landscape of PoS MalwareOutput
Conclusions from Tracking Server Attacks at Scale
201504 securing cassandraanddse
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Getting Started in Blockchain Security and Smart Contract Auditing
ATT&CKING Containers in The Cloud
Automation Patterns for Scalable Secret Management
When Insiders ATT&CK!

What's hot (20)

PDF
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
PDF
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
PDF
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
PPTX
The Rise of Secrets Management
PDF
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
PDF
FIWARE Tech Summit - FIWARE NGSIv2 Introduction
PPTX
Let's get started with passwordless authentication using windows hello in you...
PPTX
Zero trust Architecture
PDF
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
PDF
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
PDF
OAuth 2.0 Security Reinforced
PPTX
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
PDF
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
PDF
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
PPTX
Certificate pinning in android applications
PPTX
How to do right cryptography in android part 3 / Gated Authentication reviewed
PPTX
Cryptzone: The Software-Defined Perimeter
PPTX
Cryptzone AppGate Technical Architecture
PPTX
How to do Cryptography right in Android Part One
PDF
Putting the PRE into ATTACK
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
The Rise of Secrets Management
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
FIWARE Tech Summit - FIWARE NGSIv2 Introduction
Let's get started with passwordless authentication using windows hello in you...
Zero trust Architecture
(SACON) Pradyumn Nand & Mrinal Pande - Metron & Blitz, Building and scaling y...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
OAuth 2.0 Security Reinforced
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
Web Apps vs Blockchain dApps (Smart Contracts): tools, vulns and standards
Certificate pinning in android applications
How to do right cryptography in android part 3 / Gated Authentication reviewed
Cryptzone: The Software-Defined Perimeter
Cryptzone AppGate Technical Architecture
How to do Cryptography right in Android Part One
Putting the PRE into ATTACK
Ad

Similar to More zBang for the zBuck (20)

PDF
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
PDF
CyberArk Cleveland Defend Non-Human ID Exploitations
PDF
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
PDF
Using Vault to decouple MySQL Secrets
PDF
Breaking The Cloud Kill Chain
PDF
The Hacking Games - Hybrid Cloud Attack Surface Reduction Meetup 09102024.pdf
PDF
Carlos García - Pentesting Active Directory [rooted2018]
PPTX
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
PPTX
Where to Store the Cloud Encryption Keys - InterOp 2012
PPTX
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
PPTX
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
PPTX
Crypt-Oh No!
PPTX
Secure Your Data Assets
PPTX
Forging Trusts for Deception in Active Directory
PDF
MongoDB World 2018: Enterprise Security in the Cloud
PDF
MongoDB World 2018: Enterprise Cloud Security
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PPTX
Owasp Indy Q2 2012 Cheat Sheet Overview
PDF
Database Security Threats - MariaDB Security Best Practices
PDF
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Cassandra Day London 2015: Securing Cassandra and DataStax Enterprise
CyberArk Cleveland Defend Non-Human ID Exploitations
C* Summit 2013: Lock it Up: Securing Sensitive Data by Sam Heywood
Using Vault to decouple MySQL Secrets
Breaking The Cloud Kill Chain
The Hacking Games - Hybrid Cloud Attack Surface Reduction Meetup 09102024.pdf
Carlos García - Pentesting Active Directory [rooted2018]
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
Where to Store the Cloud Encryption Keys - InterOp 2012
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
Crypt-Oh No!
Secure Your Data Assets
Forging Trusts for Deception in Active Directory
MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Cloud Security
Cloud data governance, risk management and compliance ny metro joint cyber...
Owasp Indy Q2 2012 Cheat Sheet Overview
Database Security Threats - MariaDB Security Best Practices
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
Ad

Recently uploaded (20)

DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
PPTX
Digital Project Mastery using Autodesk Docs Workshops
PPTX
PORTFOLIO SAMPLE…….………………………………. …pptx
PDF
Testing & QA Checklist for Magento to Shopify Migration Success.pdf
PPTX
Partner to Customer - Sales Presentation_V23.01.pptx
PPTX
using the citation of Research to create a research
PPT
chapter 5: system unit computing essentials
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
DOCX
Audio to Video AI Technology Revolutiona
PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PPTX
Slides World Games Great Redesign Eco Economic Epochs.pptx
DOCX
MLS 113 Medical Parasitology (LECTURE).docx
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
PPTX
Concepts of Object Oriented Programming.
PPTX
Basic_of_Computer_System.pptx class-8 com
PDF
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
PDF
How Technology Shapes Our Information Age
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
Digital Project Mastery using Autodesk Docs Workshops
PORTFOLIO SAMPLE…….………………………………. …pptx
Testing & QA Checklist for Magento to Shopify Migration Success.pdf
Partner to Customer - Sales Presentation_V23.01.pptx
using the citation of Research to create a research
chapter 5: system unit computing essentials
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
Audio to Video AI Technology Revolutiona
Lesson.-Reporting-and-Sharing-of-Findings.pdf
Slides World Games Great Redesign Eco Economic Epochs.pptx
MLS 113 Medical Parasitology (LECTURE).docx
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
IOT LECTURE IOT LECTURE IOT LECTURE IOT LECTURE
Concepts of Object Oriented Programming.
Basic_of_Computer_System.pptx class-8 com
AGENT SLOT TERPERCAYA INDONESIA – MAIN MUDAH, WD CEPAT, HANYA DI KANCA4D
How Technology Shapes Our Information Age

More zBang for the zBuck

Editor's Notes

  • #29: The SID history attribute is an attribute that can be assigned to each domain account and can be used in case of migration of an account between two trusted domains. The attribute can be manipulated by attackers to escalate privilege.
  • #41: This module can assist blue teams to identify risky Kerberos delegation configurations as well as red teams to impersonate arbitrary users by leveraging KCD with Protocol Transition