当前位置:网站首页>Azure Active Directory brute force attack
Azure Active Directory brute force attack
2022-06-23 08:14:00 【Khan security team】
Azure AD Seamless single sign on
Azure AD Seamless single sign on (SSO) Improved use of Azure AD Identity platform ( for example Microsoft 365) The user experience of the service . Configure seamless SSO after , Users who log on to their domain joined computers automatically log on to Azure AD .
seamless SSO Function use Kerberos agreement , This is a Windows Standard authentication methods for the network . In seamless SSO During configuration , It's local Active Directory (AD) Create a field named AZUREADSSOACC Computer object for , And assign the service principal name to it (SPN) “https://autologon. microsoftazuread-sso . com”. The name and AZUREADSSOACC The password hash of the computer object will be sent to Azure AD. The following automatic login windowstransport The endpoint accepts Kerberos Ticket :
https:// automatic logon .microsoftazuread-sso . com//winauth/trust/2005/windowstransport
seamless SSO Automatically , No user interaction is required ( See chart 1).
- Users try to access Azure AD.
- Azure AD The tenant that identifies the user is configured to use seamless SSO, And redirect the user's browser to automatic login .
- The user's browser attempts to access Azure AD.
- Autologon send out Kerberos Authentication challenge .
- The user's browser attempts to authenticate as the logged in user and requests a ticket to grant a ticket (TGT).
- Local AD take TGT Send to the user's browser .
- The user's browser is from local AD Request automatic login access , And provide TGT As proof of identity .
- Local AD Locate the appropriate computer object and create a service ticket (ST), This ticket uses AZUREADSSOACC The password hash of the computer account is encrypted .
- The user's browser sends another automatic login request , And in the requested Authorization The header provides ST.
- Autologon Use AZUREADSSOACC Password hash decryption for computer account ST, Issue to the user DesktopSSOToken The access token , And through the Azure AD 's redirect request sends this token to the user's browser .DesktopSSOToken yes Microsoft Encrypted opacity blob, So the actual content is unknown .
- The user's browser uses DesktopSSOToken As a security assertion markup language ( SAML ) Assert to Azure AD Make another request .
Defects in the agreement
except windowstransport Outside the authentication endpoint , There is also a for user name and password authentication usernamemixed Endpoint :
https:// automatic logon .microsoftazuread-sso . com//winauth/trust/2005/usernamemixed
chart 2 Shows the user name and password login process .
- Contains the username and password XML The file is sent to usernamemixed Endpoint
- Automatic login attempts to use the supplied credentials to Azure AD Authentication .
- If authentication is successful , Automatic login will send a message containing DesktopSSOToken Access token XML file ( See chart 4). If authentication is unsuccessful , Automatic login will generate an error ( See chart 5).
- If authentication is successful , Will DesktopSSOToken The access token is sent to Azure AD.
surface 1 Lists the error codes that may be returned . Not all error codes indicate violent attempts . for example , error AADSTS50053 Indicates that the user name and password are correct , But the account is locked .
Error code | explain |
|---|---|
AADSTS50034 | The user doesn't exist |
AADSTS50053 | The user exists and has entered the correct user name and password , But the account is locked |
AADSTS50056 | The user exists but is Azure AD There is no password in |
AADSTS50126 | Users exist , But I entered the wrong password |
AADSTS80014 | Users exist , But it has exceeded the maximum Pass-through Authentication Time |
CTU The researchers observed that , A successful authentication event will occur in step 4 Generate login log in . however , Automatic login pairs are not logged Azure AD Authentication of ( step 2). This omission allows threat participants to exploit usernamemixed The endpoint performs an undetected violent attack .
Conclusion
Threat participants can use the automatic login username hybrid endpoint to perform violent attacks . This activity will not be recorded in Azure AD Login log , Therefore, it will not be detected . In this publication , Tools and Countermeasures for detecting brute force cracking or password injection attacks are based on log events .
CTU The analysis shows that the automatic login service is through Azure Active Directory Federation service (AD FS) Realized .Microsoft AD FS The documentation recommends that you disable the windowstransport End point's Internet visit . however , seamless SSO This access is required .Microsoft Only in Office 2013 2015 year 5 Previous version before monthly update Office The client needs usernamemixed Endpoint .
This utilization is not limited to the use of seamless SSO Organization . Threat participants can take advantage of any Azure AD or Microsoft 365 Auto login user name hybrid endpoint in the organization , Including the use of pass through authentication ( PTA ) Organization . No, Azure AD Password users are not affected .
In this publication , There are no known mitigation techniques to prevent the use of automatic login usernamemixed Endpoint . Multifactor Authentication ( MFA ) And conditional access ( CA ) Will not prevent the use of , Because they are applied after successful authentication .
边栏推荐
- openvino系列 18. 通过OpenVINO和OpenCV实现实时的物体识别(RTSP,USB视频读取以及视频文件读取)
- After reading five books, I summarized these theories of wealth freedom
- 十多年前的入职第一天
- Interview questions of a company in a certain month of a certain year (1)
- Markdown learning
- typeScript的介绍与变量定义的基本类型
- 11 字符串函数
- Match 56 de la semaine d'acwing [terminé]
- C Scrollview scroll up or scroll down
- VTK. Le bouton gauche de la souris JS glisse pour changer le niveau et la largeur de la fenêtre
猜你喜欢

Does huangrong really exist?

走好数据中台最后一公里,为什么说数据服务API是数据中台的标配?

Check the file through the port

VTK. Le bouton gauche de la souris JS glisse pour changer le niveau et la largeur de la fenêtre

Active Directory之AD对象

ThreadPoolExecutor线程池实现原理与源码解析

开源技术交流丨批流一体数据同步引擎ChunJun数据还原-DDL功能模块解析
![Vulnhub | dc: 4 | [actual combat]](/img/33/b7422bdb18f39e9eb55855dbf1d584.png)
Vulnhub | dc: 4 | [actual combat]

Interview questions of a company in a certain month of a certain year (1)

imperva-查找正则匹配超时的方法
随机推荐
81 sentences worth repeating
Imperva- method of finding regular match timeout
vtk. JS left mouse button sliding to change window level and window width
vtk.js鼠标左键滑动改变窗位和窗宽
Easycvr accesses the website through the domain name. How to solve the problem that the video cannot be viewed back?
Interview questions of a company in a certain month of a certain year (1)
socket编程(多进程)
配置ASMX无法访问
Implementation principle and source code analysis of ThreadPoolExecutor thread pool
实战监听Eureka client的缓存更新
爬虫框架
Quickly create a consumer cluster
@What is the difference between controller and @restcontroller?
domain controller
SQL注入常用到的绕过方式-ctf
Ignore overlength parameter violation
MySQL common skills
There are some limitations in cluster expansion and contraction
Openvino series 19 Openvino and paddleocr for real-time video OCR processing
Vulnhub | DC: 4 | [combat]