15 min

BSides Detroit 13 Episode 19 podcast.michsec.org

    • Technology

James Foster joins Wolfgang Goerlich on the podcast to discuss trust relationships. How does pass-the-hash actually work? James: "Before I did security assessments and pen testing, I knew about some of these problems. I think a lot of Windows admins and defenders do. But I did not fully understand their implications and I did not fully understand their impact. And that is the reason I want to do this talk." Listen to learn more.

Abstract: What's a trust relationship? Explicit ones are easy -- these you setup explicitly and on purpose, like when you want Domain A to trust Domain B for authentication. It's the implicit ones that will get you, the ones you didn't setup on purpose. Like when you have the same local administrator password on a bunch of systems (own one, own them all!). Or when a domain admin leaves an access token behind on some user's workstation (user owns the domain!). If you support or defend Windows systems, you should know about the different kinds of implicit trusts in Windows (accounts, cached credentials and access tokens) and how to reduce your risks from them. Oh, and you know the phase of an APT-style attack after the end user's workstation is compromised but before they own your domain? The one that is sometimes glossed over with the phrases "lateral movement" and "privilege escalation"? Oftentimes, this happens by exploiting trust relationships.

For more information about BSides Detroit 13, please see:

Conference website
Conference tickets

James Foster joins Wolfgang Goerlich on the podcast to discuss trust relationships. How does pass-the-hash actually work? James: "Before I did security assessments and pen testing, I knew about some of these problems. I think a lot of Windows admins and defenders do. But I did not fully understand their implications and I did not fully understand their impact. And that is the reason I want to do this talk." Listen to learn more.

Abstract: What's a trust relationship? Explicit ones are easy -- these you setup explicitly and on purpose, like when you want Domain A to trust Domain B for authentication. It's the implicit ones that will get you, the ones you didn't setup on purpose. Like when you have the same local administrator password on a bunch of systems (own one, own them all!). Or when a domain admin leaves an access token behind on some user's workstation (user owns the domain!). If you support or defend Windows systems, you should know about the different kinds of implicit trusts in Windows (accounts, cached credentials and access tokens) and how to reduce your risks from them. Oh, and you know the phase of an APT-style attack after the end user's workstation is compromised but before they own your domain? The one that is sometimes glossed over with the phrases "lateral movement" and "privilege escalation"? Oftentimes, this happens by exploiting trust relationships.

For more information about BSides Detroit 13, please see:

Conference website
Conference tickets

15 min

Top Podcasts In Technology

Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
Lex Fridman Podcast
Lex Fridman
TED Radio Hour
NPR
Darknet Diaries
Jack Rhysider