Presentation is loading. Please wait.

Presentation is loading. Please wait.

“Pass the Hash” Detection with DDNA

Similar presentations


Presentation on theme: "“Pass the Hash” Detection with DDNA"— Presentation transcript:

1 “Pass the Hash” Detection with DDNA
Phil Wallisch

2 The Need It is possible for “admin” users to dump LSA hashes on modern Windows platforms An attacker can impersonate any user by leveraging a captured hash No persistent malware is required to perform the attack. We must detect exited tools. Detect hash dumping/injecting capability in running processes

3 The Approach Locate attack remnants in unallocated memory
Identify active processes that exhibit hash grabbing characteristics

4 Attack Tools Examined Pass-The-Hash (PTH) Toolkit Gsecdump Pwdump6
Gsecdump Pwdump6

5 Attack Procedure Platform: Windows XP SP2 32bit running in VMWare Workstation 6.5. Two users added to the “administrator” group: ‘attacker’ and ‘victim’ Victim logs in via a standard interactive session The “switch user” functionality is executed Attacker logs in via a standard interactive session Attacker executes the hash dump functionality of the tool

6 PTH Toolkit Example

7 Gsecdump Example

8 Pwdump6 Example

9 Locate Attack Remnants
External Research: indicates that password hashes should not be present in virtual memory in their unencrypted form Internal Testing: performed a pattern matching string search across 54 memory images from a live corporate environment 60 malware infected memory images from a lab environment 3 separate memory images where hash dumping tools were individually run

10 Locate Attack Remnants (cont.)
Pattern Used: "\b[a-fA-F0-9]{32}:[a-fA-F0-9]{32}\b“ Word bounded search for two 32 hexadecimal character patterns separated by a colon Results: Live corporate images = 0 matches Malware infected images = 0 matches Hash dump memory images = 60 matches

11 Locate Attack Remnants (cont.)
Conclusion: DDNA should have a hard fact for the presence of a string pattern "\b[a-fA-F0-9]{32}:[a-fA-F0-9]{32}\b” in any location in memory including unallocated space. This hard fact indicates evidence of an unencrypted LSA hash in memory on a system of interest. This technique is a tool agnostic approach to discovering LSA tampering.

12 Active Processes Detection Goals:
Modules with LSA hash dumping capabilities Modules with LSA hash injecting capabilities Solution: DDNA traits covering PTH techniques Naming convention of DDNA traits: PTH_X where “X” = trait number

13 LSASS Injection - PTH_1 iam-alt.exe DDNA PTH_1 Research:
Regex Pattern: (virtualalloc|createremotethread|lsass.exe) Translate to AND logic in DDNA

14 LSASS Injection - PTH_1 (cont.)
gsecdump.exe pwdump6.exe

15 LSASRV.DLL Loading - PTH_2

16 Active Processes Conclusion
DDNA Traits Required: PTH_1: Hash Injection : Identify LSASS DLL injection : I“VirtualAlloc"ku AND I“CreateRemoteThread”ku AND I”lsass.exe”ku PTH_2: Hash Dumping : Identify LSASRV.DLL access : I”lsasrv.dll”ku NOT N”svchost.exe” NOT N”lsass.exe”


Download ppt "“Pass the Hash” Detection with DDNA"

Similar presentations


Ads by Google