Forum Discussion
chrispay
Feb 20, 2019Copper Contributor
Mitigating Lateral Movement Attacks
As I understand it, the risk of a lateral movement attack is increased where sensitive users (e.g. domain admins) log onto the same machine as std users (with Internet access / email access / etc) wh...
- Feb 20, 2019Hi,
Cached credentials are used to verify authenticating user when there is no connectivity to the DC and not used for lateral movement since they are only valid for the machine itself. In addition, the hash is different than those used for NTLM/Kerberos so it won't be useful for moving laterally. Also they're considered quite hard to reverse/break, so limiting the cached creds to 0 or 1 would only cause issues than help.
chrispay
Feb 20, 2019Copper Contributor
Thanks. Which credentials does a lateral transfer attack use if it doesn't use the domain authenticated cached credentials?
igrady
Microsoft
Feb 20, 2019Credentials stored in Credential manager, LSASS memory and other locations, but not cached credentials.
- chrispayFeb 20, 2019Copper Contributor
Thank you. That's is very helpful.
- Gerson LevitzMar 01, 2019Iron Contributor
Also to clarify the latermal movement path with identify where a sensitive user has logged onto a machine where there is a non-sensitive user who is a member of the local administrators group. AATP will also then calculate the paths to this machine.