当前位置:网站首页>Microsoft Exchange – prevent network attacks
Microsoft Exchange – prevent network attacks
2022-06-23 07:52:00 【Khan security team】
Microsoft Exchange Servers are a common target for threat participants , Not only do they provide multiple entry points , And because they are binding to Active Directory Provides opportunities for persistence and domain upgrade . adopt Exchange Breaking connections to an organization's domains can be a trivial task , Especially in the absence of many security controls .
The following figure illustrates a real-world attack carried out by a threat participant , The aim is through abuse Exchange service 、Exchange API And standards Outlook Function to achieve complete domain intrusion .
Stopping these attacks requires a series of measures that the organization should implement , To reduce passing Microsoft Exchange The risk of security vulnerabilities in the connection . These measures include :
- Disable unnecessary services
- Enable two factor authentication
- Enable LDAP Signature and LDAP binding
- Apply key security patches and workarounds
Disable unnecessary services
Microsoft Exchange The following services are enabled by the default installation of :
- Outlook Web visit (OWA)
- Switching network services (EWS)
- Exchange ActiveSync (EAS)
All these services create an attack surface , A threat participant may discover legal credentials by performing 、 Access user mailboxes and perform domain upgrade attacks .Outlook Web Access Enable domain users to access their mailboxes from outside . however , If business requires , Should be evaluated Exchange Web Service and Exchange ActiveSync.
Exchange Web Services allow client applications to interact with Exchange The server communicates . If EWS Unable to meet specific business needs , Access should be disabled . from Exchange The command line management program will disable access to all mailboxes by executing the following command .
Get-Mailbox | Set-CASMailbox -EwsEnabled $false
ActiveSync The protocol allows domain users' mobile devices to communicate with Exchange Mailbox synchronization data ( mail 、 The calendar 、 Contacts and tasks ). If the enterprise does not need this Agreement , It should be disabled .
Get-Mailbox | Set-CasMailbox -ActiveSyncEnabled $false
Authentication should also be disabled , To reduce the attack surface threatening participants during password injection attacks .
Enable two factor authentication
Most and Microsoft Exchange Related attacks require that the attacker has obtained the user's domain credentials ( Code spray 、 Phishing, etc ). For all exposed services ( Such as Outlook Web Access、Exchange Web Service and ActiveSync) Enable 2 Factor authentication will prevent threatening participants :
- Access user mailboxes and collect sensitive data
- Conduct internal phishing attacks with a higher success rate
- Through arbitrary Outlook Rules implement network persistence
- Destruction domain
Even two factor authentication will provide an additional layer of security , It should also be seen only as the first line of defence . There are other remedies that need to be taken to prevent the execution of the attack .
Apply key patches and workarounds
Microsoft It is recommended to delete the following registry key , In order to prevent against Exchange The network loopback address of the server is proposed NTLM Authentication request . This action will prevent the implementation of the attack , Enable threat participants to add forwarding rules to the target mailbox or add infected accounts as principals . The impact is to retrieve emails and impersonate users , This will allow for internal phishing attacks .
reg delete HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa /v DisableLoopbackCheck /f
The abuse of Exchange Push Subscription The domain can be upgraded .Microsoft Patches have been released , By reducing the impact on Active Directory To repair various versions of Exchange Server issues .
- KB4471391 – In exchange for 2019
- KB4471392 – In exchange for 2016
- KB4345836 – In exchange for 2013
- KB4487052 – In exchange for 2010
This technique requires effective Exchange The credentials , And rely on EWS To perform authentication . Ban Exchange Web service (EWS) Authentication of will prevent attacks .
Again , Disable cross organizational Exchange Web Service mailbox access will produce the same results .
Get-Mailbox | Set-CASMailbox -EwsEnabled $false
Threat participants will not be able to pass Exchange Authenticate to send API call , They will receive the following error in their terminal .
Benjamin Delpy stay Twitter This paper proposes a method of MaxSubscriptions Set to zero to mitigate the vulnerability . This setting will prevent Exchange Send any EWS notice .
Need from Exchange The command line manager executes the following commands :
New-ThrottlingPolicy -Name NoEWSSubscription -ThrottlingPolicyScope Organization -EWSMaxSubscriptions 0 Restart-WebAppPool -Name MSExchangeServicesAppPool
Attempts to use... Will not be allowed Exchange API call ( push subscription ) To perform domain upgrade .
Completely disabled EWS Authentication will also be done NTLM Relay attack , These attacks will be targeted to gain access to the user's mailbox without cracking the password hash .
perhaps , If authentication is required , Can be Microsoft Exchange Configured to deny all incoming domain accounts NTLM Traffic .
This will lead threat participants to exploit NTLM Relay as a technology to obtain mailbox access rights and perform malicious operations failed .
The rules
Nick Landers stay 2015 Annual discovery , For remote location (WebDAV or SMB share ) Execute arbitrary code and gain persistent access to the user's host , May abuse Microsoft Outlook( Rules and alerts ) The function of .Microsoft Released a patch ( KB3191893 ), It solves this problem by creating registry entries . A value of zero disables Outlook The rules .
Outlook 2016 HKEY_USERS\<SID>\Software\Microsoft\Office\16.0\Outlook\Security\EnableUnsafeClientMailRules Outlook 2013 HKEY_USERS\<SID>\Software\Microsoft\Office\15.0\Outlook\Security\EnableUnsafeClientMailRules
application Microsoft The patch will permanently disable any client mail rules .
Outlook home page
Outlook The home function can be used to inject pages that will perform any payload on the user's system . Browse the mailbox folder or restart Microsoft Outlook Will trigger the payload . The discovery of this technology belongs to Etienne Stallans, And the implementation of this attack requires user credentials .
Microsoft Patches have been released ( KB4011162 ), This vulnerability is resolved by removing the home page feature from the inbox properties .
Enforcement LDAP Signature and LDAP Channel binding
And Microsoft Exchange Various attacks related to abuse and Active Directory Existing trust relationship , To modify permissions and gain elevated access . To prevent these attacks, you need to enable LDAP Signature and LDAP binding . at present , This setting is disabled by default , but Microsoft Plan to release a security to update (2020 year 1 month ), Enabled LDAP Signature and LDAP binding . Administrators can manually make changes by modifying the group policy management editor .
Clients can be enabled through group policy or local security policy LDAP Signature .
You can enable... By creating a registry key at the following registry location LDAP binding :
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<LDS instance name>\Parameters
value 2 Indicates that channel binding is always enabled .
LdapEnforceChannelBinding=2
Generalization
Apply on time Microsoft Security patches and implementation of workarounds will improve the organization's understanding of Microsoft Exchange Resilience to targeted cyber attacks . The following figure summarizes the patches and mitigation fixes described in this article .
The following table relates the functions abused by threat participants , They can use the relevant Microsoft Patches and CVE What does numbering accomplish .
Functionality | technology | Microsoft patch | CVE Number |
|---|---|---|---|
Looking ahead rules | Code execution | KB3191883KB3191893KB3191938 | Do not apply |
Outlook home page | Code execution | KB4011162 – 2016KB4011178 – 2013KB4011196 – 2010 | CVE-2017-11774 |
Outlook table | Code execution | KB3191883 | Do not apply |
push subscription | Elevated privileges | Do not apply | CVE-2018-8581 |
push subscription | Domain upgrade | KB4471391 – 2019KB4471392 – 2016KB4345836 – 2013KB4487052 – 2010 | CVE-2019-0686CVE-2019-0724 |
边栏推荐
- 深度学习------不同方法实现vgg16
- Detailed explanation of redis persistence, master-slave and sentry architecture
- AVL树的实现
- WPS for thesis writing installs MathType plug-in to write mathematical formulas
- 帆软堆积图显示占比
- Judge black production based on CDN and client slow log characteristics
- PHP 文件包含 -ctf
- Make a record of glib2.14 upgrading glib2.18 and the principle of the steps
- [Laoke] how should ordinary people learn technology?
- Distributed ID generation
猜你喜欢

C WPF additional attribute implementation interface defines decorator

QT project error: -1: error: cannot run compiler 'clang++' Output:mingw32-make. exe

QT reading XML files using qdomdocument

深度学习------不同方法实现vgg16

【Try to Hack】ip地址

On ThreadLocal and inheritablethreadlocal, source code analysis

3dmax插件开发环境配置及FileExport和Utilities模板测试

Qt 使用QDomDocument读取xml文件

Apache Solr 任意文件读取复现

深度学习------不同方法实现lenet-5模型
随机推荐
【星球精选】如何高效构建 Roam 与 theBrain 间细粒度双向链接?
Mathematical knowledge: fast power fast power
Match 56 de la semaine d'acwing [terminé]
279. perfect square
How do I install MySQL on my computer?
2. probability theory - axiom of probability theory
【Kubernetes】Kubernetes各大版本的最新版本下载地址
数学知识:快速幂—快速幂
mysql中多表视图性能疑惑
ArcMap批量删除距离较近的点
ArcMap batch delete points closer
Acwing game 56 [End]
基于51单片机的温度检测监测报警系统设计
google常用语法
3dmax插件开发环境配置及FileExport和Utilities模板测试
链游飞船开发 农民世界链游开发 土地链游开发
Matlab random volatility SV, GARCH using MCMC Markov chain Monte Carlo method to analyze exchange rate time series
深度学习------卷积(conv2D)底层
Test APK exception control nettraffic attacker development
Deploy kubersphere in kubernetes