Additional AD Auditing Techniques
We want to provide our customers with as much information as possible to help solve the potential issues we find. Doing so will give them more data to prove they have a problem and help acquire backing and funding to tackle those fixes.
Creating an AD Snapshot with Active Directory Explorer
AD Explorer is part of the Sysinternal Suite and is described as:
"An advanced Active Directory (AD) viewer and editor. You can use AD Explorer to navigate an AD database easily, define favorite locations, view object properties, and attributes without opening dialog boxes, edit permissions, view an object's schema, and execute sophisticated searches that you can save and re-execute."
PingCastle is a powerful tool that evaluates the security posture of an AD environment and provides us the results in several different maps and graphs. Thinking about security for a second, if you do not have an active inventory of the hosts in your enterprise, PingCastle can be a great resource to help you gather one in a nice user-readable map of the domain. PingCastle is different from tools such as PowerView and BloodHound because, aside from providing us with enumeration data that can inform our attacks, it also provides a detailed report of the target domain's security level using a methodology based on a risk assessment/maturity framework. The scoring shown in the report is based on the Capability Maturity Model Integration (CMMI). For a quick look at the help context provided, you can issue the
--help switch in cmd-prompt.
C:\xyz> PingCastle.exe --help switch: --help : display this message --interactive : force the interactive mode --log : generate a log file --log-console : add log to the console --log-samba <option>: enable samba login (example: 10) Common options when connecting to the AD --server <server> : use this server (default: current domain controller) the special value * or *.forest do the healthcheck for all domains --port <port> : the port to use for ADWS or LDAP (default: 9389 or 389) --user <user> : use this user (default: integrated authentication) --password <pass> : use this password (default: asked on a secure prompt) --protocol <proto> : selection the protocol to use among LDAP or ADWS (fastest) : ADWSThenLDAP (default), ADWSOnly, LDAPOnly, LDAPThenADWS <SNIP>
To run PingCastle, we can call the executable by typing
PingCastle.exe into our CMD or PowerShell window or by clicking on the executable, and it will drop us into interactive mode, presenting us with a menu of options inside the
Terminal User Interface (
|:. PingCastle (Version 126.96.36.199 1/19/2022 8:12:02 AM) | #:. Get Active Directory Security at 80% in 20% of the time # @@ > End of support: 7/31/2023 | @@@: : .# Vincent LE TOUX ([email protected]) .: twitter: @mysmartlogon https://www.pingcastle.com What do you want to do? ======================= Using interactive mode. Do not forget that there are other command line switches like --help that you can use 1-healthcheck-Score the risk of a domain 2-conso -Aggregate multiple reports into a single one 3-carto -Build a map of all interconnected domains 4-scanner -Perform specific security checks on workstations 5-export -Export users or computers 6-advanced -Open the advanced menu 0-Exit ============================== This is the main functionnality of PingCastle. In a matter of minutes, it produces a report which will give you an overview of your Active Directory security. This report can be generated on other domains by using the existing trust links.
The default option is the
healthcheck run, which will establish a baseline overview of the domain, and provide us with pertinent information dealing with misconfigurations and vulnerabilities. Even better, PingCastle can report recent vulnerability susceptibility, our shares, trusts, the delegation of permissions, and much more about our user and computer states. Under the Scanner option, we can find most of these checks.
|:. PingCastle (Version 188.8.131.52 1/19/2022 8:12:02 AM) | #:. Get Active Directory Security at 80% in 20% of the time # @@ > End of support: 7/31/2023 | @@@: : .# Vincent LE TOUX ([email protected]) .: twitter: @mysmartlogon https://www.pingcastle.com Select a scanner ================ What scanner whould you like to run ? WARNING: Checking a lot of workstations may raise security alerts. 1-aclcheck 9-oxidbindings 2-antivirus a-remote 3-computerversion b-share 4-foreignusers c-smb 5-laps_bitlocker d-smb3querynetwork 6-localadmin e-spooler 7-nullsession f-startup 8-nullsession-trust g-zerologon 0-Exit ============================== Check authorization related to users or groups. Default to everyone, authenticated users and domain users
Throughout the report, there are sections such as domain, user, group, and trust information and a specific table calling out "anomalies" or issues that may require immediate attention. We will also be presented with the domain's overall risk score.
Aside from being helpful in performing very thorough domain enumeration when combined with other tools, PingCastle can be helpful to give clients a quick analysis of their domain security posture, or can be used by internal teams to self-assess and find areas of concern or opportunities for further hardening.
Group3r is a tool purpose-built to find vulnerabilities in Active Directory associated Group Policy. Group3r must be run from a domain-joined host with a domain user (it does not need to be an administrator), or in the context of a domain user (i.e., using
C:\xyz> group3r.exe -f <filepath-name.log>
When running Group3r, we must specify the
-s or the
-f flag. These will specify whether to send results to stdout (-s), or to the file we want to send the results to (-f). For more options and usage information, utilize the
-h flag, or check out the usage info at the link above.
When reading the output from Group3r, each indentation is a different level, so no indent will be the GPO, one indent will be policy settings, and another will be findings in those settings. Below we will take a look at the output shown from a finding.
In an assessment where stealth is not required, it is also worth running a tool like ADRecon and analyzing the results, just in case all of our enumeration missed something minor that may be useful to us or worth pointing out to our client.
PS C:\xyz> .\ADRecon.ps1 [*] ADRecon v1.1 by Prashant Mahajan (@prashant3535) [*] Running on legalcorp.local\MS01 - Member Server [*] Commencing - 03/28/2022 09:24:58 [-] Domain [-] Forest [-] Trusts [-] Sites [-] Subnets [-] SchemaHistory - May take some time [-] Default Password Policy [-] Fine Grained Password Policy - May need a Privileged Account [-] Domain Controllers [-] Users and SPNs - May take some time [-] PasswordAttributes - Experimental [-] Groups and Membership Changes - May take some time [-] Group Memberships - May take some time [-] OrganizationalUnits (OUs) [-] GPOs [-] gPLinks - Scope of Management (SOM) [-] DNS Zones and Records [-] Printers [-] Computers and SPNs - May take some time [-] LAPS - Needs Privileged Account [-] BitLocker Recovery Keys - Needs Privileged Account [-] GPOReport - May take some time [*] Total Execution Time (mins): 11.05 [*] Output Directory: C:\Tools\ADRecon-Report-20220328092458
You will get a report in HTML format and a folder with CSV results. When generating the report, it should be noted that Excel needs to be installed, or the script will not automatically generate the report in that manner; it will just leave you with the .csv files. If you want output for Group Policy, you need to ensure the host you run from has the
GroupPolicy PowerShell module installed. We can go back later and generate the Excel report from another host using the
-GenExcel switch and feeding in the report folder.
PS C:\xyz> ls Directory: C:\Tools\ADRecon-Report-20220328092458 Mode LastWriteTime Length Name ---- ------------- ------ ---- d----- 3/28/2022 12:42 PM CSV-Files -a---- 3/28/2022 12:42 PM 2758736 GPO-Report.html -a---- 3/28/2022 12:42 PM 392780 GPO-Report.xml