Active Directory attack path management: How to visualize, detect, and remediate attack paths
Objective
A help desk technician's account has been exposed in a phishing attempt. While this account does not have direct privileged access, the security team needs to assess whether an attacker could use it as an entry point to reach domain-level privileges.
Challenge
Manual investigation into nested group memberships, access control list permissions, and delegation settings is time-consuming and error-prone. The organization needs to quickly determine if the compromised help desk account is part of any attack path that leads to high-value targets like the Domain Admins or Enterprise Admins groups.
What is attack path management and how ADManager Plus can help
Attack path management is the process of identifying, visualizing, and mitigating the potential routes an attacker could use to move laterally through an AD environment to escalate privileges and gain access to sensitive resources. It involves analyzing group memberships, object relationships, and inheritance permissions to uncover hidden or risky links between AD objects and taking targeted actions to manage or eliminate these exposure paths.
Access Graph, a component of the risk exposure management feature in ADManager Plus, helps analyze attack paths, understand privilege relationships, and manage risky links. The security team can visualize the Access Graph of the compromised help desk account and take remediation measures from ADManager Plus.
How to visualize and analyze attack paths in ADManager Plus using Access Graph?
- Log in to ADManager Plus.
- In the top-right corner, click AD Explorer.
- Expand the OU where the compromised help desk account is present.
- Click the help desk account and navigate to Entitlements > Access Graph.
- Select the privileged entity whose exposure you want to analyze.
- An Access Graph will then be displayed.
- Click an object to view details like permissions, scope, and more.
- Click on the lines connecting objects to understand:
- The nature of their relationship
- The likelihood of exploitation
- Recommended remediation steps
In this case, the Access Graph shows:
- The help desk person is a member of a group called Support Group.
- Support Group has write access to a server called SUPPORT-SRV1.
- SUPPORT-SRV1 has an unconstrained delegation setting configured.
- A privileged user called Backup Admin often logs in to SUPPORT-SRV1.
- Backup Admins is a member of Backup Operators, which has custom delegated permissions on domain objects.
This chain of relationships results in a potential escalation to Domain Admins.
Remediating attack paths using ADManager Plus
After identifying risky links, the security team can take these remediation actions:
- Entry point isolation: Review group memberships of the help desk account and remove it from any non-essential groups, especially those with access to infrastructure, in this case, Support Group.
To accomplish this:
- Go to AD Explorer and locate the user.
- Navigate to Entitlements > Group Membership.
- View all direct and nested memberships of the user.
- Click Modify User to remove the user from critical and non-essential groups.
Alternatively, you can also use ADManager Plus' predefined AD user reports to identify the group a user belongs to. Here's how:
- Navigate to Reports > User Reports.
- Under Nested Reports, click Groups for Users.
- Select the domain and the help desk account.
- Click Generate to view all group memberships.
- Remove the user from high-risk groups as needed.
- Harden the intermediate asset:
- Remove unconstrained delegation from SUPPORT-SRV1 and replace it with constrained delegation if necessary.
- Audit and restrict local admin access on SUPPORT-SRV1 to prevent privileged users from logging in.
Using ADManager Plus' predefined AD computer reports, understand the delegation settings of the server and take necessary actions.
- Navigate to Reports > Computer Reports.
- Under General Reports, click All Computers.
- Select the desired domains and click Generate.
- Search and locate the server to learn about its delegation settings.
- Redesign group delegations:
- Review and manage group membership details of the Backup Operators group using group membership reports in ADManager Plus.
- Review permissions granted to this group and remove unnecessary permissions.
To view and modify group memberships:
- Navigate to Reports > Group Reports.
- Under Member-based Reports, Click Group Members.
- Select the desired domain and group.
- Click Generate to view group members.
- Select the members that you would like to remove and click Remove from group to manage them instantly.
Outcome
The Access Graph in ADManager Plus simplifies complex privilege relationships and enables fast, accurate remediation, significantly reducing risk exposure to critical infrastructure. This approach reduces the exposure of the help desk account and helps break a lateral movement chain before it can be exploited.
Select a language to translate the contents of this web page: