当前位置:网站首页>Azure Active Directory brute force attack
Azure Active Directory brute force attack
2022-06-23 08:14:00 【Khan security team】
Azure AD Seamless single sign on
Azure AD Seamless single sign on (SSO) Improved use of Azure AD Identity platform ( for example Microsoft 365) The user experience of the service . Configure seamless SSO after , Users who log on to their domain joined computers automatically log on to Azure AD .
seamless SSO Function use Kerberos agreement , This is a Windows Standard authentication methods for the network . In seamless SSO During configuration , It's local Active Directory (AD) Create a field named AZUREADSSOACC Computer object for , And assign the service principal name to it (SPN) “https://autologon. microsoftazuread-sso . com”. The name and AZUREADSSOACC The password hash of the computer object will be sent to Azure AD. The following automatic login windowstransport The endpoint accepts Kerberos Ticket :
https:// automatic logon .microsoftazuread-sso . com//winauth/trust/2005/windowstransport
seamless SSO Automatically , No user interaction is required ( See chart 1).
- Users try to access Azure AD.
- Azure AD The tenant that identifies the user is configured to use seamless SSO, And redirect the user's browser to automatic login .
- The user's browser attempts to access Azure AD.
- Autologon send out Kerberos Authentication challenge .
- The user's browser attempts to authenticate as the logged in user and requests a ticket to grant a ticket (TGT).
- Local AD take TGT Send to the user's browser .
- The user's browser is from local AD Request automatic login access , And provide TGT As proof of identity .
- Local AD Locate the appropriate computer object and create a service ticket (ST), This ticket uses AZUREADSSOACC The password hash of the computer account is encrypted .
- The user's browser sends another automatic login request , And in the requested Authorization The header provides ST.
- Autologon Use AZUREADSSOACC Password hash decryption for computer account ST, Issue to the user DesktopSSOToken The access token , And through the Azure AD 's redirect request sends this token to the user's browser .DesktopSSOToken yes Microsoft Encrypted opacity blob, So the actual content is unknown .
- The user's browser uses DesktopSSOToken As a security assertion markup language ( SAML ) Assert to Azure AD Make another request .
Defects in the agreement
except windowstransport Outside the authentication endpoint , There is also a for user name and password authentication usernamemixed Endpoint :
https:// automatic logon .microsoftazuread-sso . com//winauth/trust/2005/usernamemixed
chart 2 Shows the user name and password login process .
- Contains the username and password XML The file is sent to usernamemixed Endpoint
- Automatic login attempts to use the supplied credentials to Azure AD Authentication .
- If authentication is successful , Automatic login will send a message containing DesktopSSOToken Access token XML file ( See chart 4). If authentication is unsuccessful , Automatic login will generate an error ( See chart 5).
- If authentication is successful , Will DesktopSSOToken The access token is sent to Azure AD.
surface 1 Lists the error codes that may be returned . Not all error codes indicate violent attempts . for example , error AADSTS50053 Indicates that the user name and password are correct , But the account is locked .
Error code | explain |
|---|---|
AADSTS50034 | The user doesn't exist |
AADSTS50053 | The user exists and has entered the correct user name and password , But the account is locked |
AADSTS50056 | The user exists but is Azure AD There is no password in |
AADSTS50126 | Users exist , But I entered the wrong password |
AADSTS80014 | Users exist , But it has exceeded the maximum Pass-through Authentication Time |
CTU The researchers observed that , A successful authentication event will occur in step 4 Generate login log in . however , Automatic login pairs are not logged Azure AD Authentication of ( step 2). This omission allows threat participants to exploit usernamemixed The endpoint performs an undetected violent attack .
Conclusion
Threat participants can use the automatic login username hybrid endpoint to perform violent attacks . This activity will not be recorded in Azure AD Login log , Therefore, it will not be detected . In this publication , Tools and Countermeasures for detecting brute force cracking or password injection attacks are based on log events .
CTU The analysis shows that the automatic login service is through Azure Active Directory Federation service (AD FS) Realized .Microsoft AD FS The documentation recommends that you disable the windowstransport End point's Internet visit . however , seamless SSO This access is required .Microsoft Only in Office 2013 2015 year 5 Previous version before monthly update Office The client needs usernamemixed Endpoint .
This utilization is not limited to the use of seamless SSO Organization . Threat participants can take advantage of any Azure AD or Microsoft 365 Auto login user name hybrid endpoint in the organization , Including the use of pass through authentication ( PTA ) Organization . No, Azure AD Password users are not affected .
In this publication , There are no known mitigation techniques to prevent the use of automatic login usernamemixed Endpoint . Multifactor Authentication ( MFA ) And conditional access ( CA ) Will not prevent the use of , Because they are applied after successful authentication .
边栏推荐
- Markdown learning
- Microsoft Exchange – prevent network attacks
- MySQL小册子笔记 5 InnoDB 记录存储结构
- C print zoom
- 深度学习------不同方法实现vgg16
- Crawler frame
- After easynvr video is enabled, no video file is generated. How to solve this problem?
- Socket programming (multithreading)
- Do not put files with garbled names into the CFS of NFS protocol
- 通过端口查文件
猜你喜欢

vtk. JS left mouse button sliding to change window level and window width

建立一有序的顺序表,并实现下列操作: 1.把元素x插入表中并保持有序; 2.查找值为x的元素,若找到将其删除; 3.输出表中各元素的值。

Apache Solr 任意文件读取复现

【论文笔记】Catching Both Gray and Black Swans: Open-set Supervised Anomaly Detection*

通过端口查文件

11 string function
![Acwing game 56 [End]](/img/f6/cd650331c819a27f17c9ce6cd0c569.png)
Acwing game 56 [End]

Structure and usage of transform

实战监听Eureka client的缓存更新

A record of "from scratch" in college student accounts
随机推荐
vtk.js鼠標左鍵滑動改變窗比特和窗寬
List接口三个子实现类
华为云服务器弹性公网IP无法ping
Copy image bitmap by C # memory method
PHP 文件包含 -ctf
C print zoom
深度学习------卷积(conv2D)底层
aquatone工具 中的2个bug修复
Socket programming (multithreading)
看了5本书,我总结出财富自由的这些理论
5本财富自由好书的精华
MySQL brochure notes 5 InnoDB record storage structure
PCB电路板特性检查项目都有哪些?
Ers function display of SAP mm
9 ways in which network security may change in 2022
Microsoft Exchange – prevent network attacks
How can easycvr access the Dahua CVS video recorder and download a video file with an empty name?
C Scrollview scroll up or scroll down
Go 数据类型篇(二)之Go 支持的数据类型概述及布尔类型
INT 104_LEC 06