词条 | Draft:Credential Guard |
释义 |
SummaryAfter compromising a system, attackers often attempt to extract any stored credentials for further lateral movement through the network. A prime target is the LSASS process, which stores NTLM and Kerberos credentials. Credential Guard protects LSASS by running it in a virtualized container that even a user with SYSTEM privileges cannot access.[5] The system then creates a proxy process called LSAIso (LSA Isolated) for communication with the virtualized LSASS process.[6] Bypass TechniquesThere are several generic techniques for stealing credentials on systems with Credential Guard:
References1. ^1 {{cite web |url=https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=cfGBPlIyC_9404300474|title=Deep Dive into Credential Guard, Credential Theft & Lateral Traversal |website=Microsoft Virtual Academy|access-date=17 September 2018}} [1][2][3][4][5][6][7]2. ^1 {{cite web |url=https://blogs.technet.microsoft.com/ash/2016/03/02/windows-10-device-guard-and-credential-guard-demystified/|title=Windows 10 Device Guard and Credential Guard Demystified|website=Microsoft TechNet, Ash's blog|access-date=17 September 2018}} 3. ^1 2 {{cite web |url=https://blog.nviso.be/2018/01/09/windows-credential-guard-mimikatz/|title=Windows Credential Guard & Mimikatz|website=nviso labs|access-date=14 September 2018|date=2018-01-09}} 4. ^1 {{cite web |url=https://docs.microsoft.com/en-us/windows/desktop/w8cookbook/third-party-security-support-providers-with-credential-guard|title=Third party Security Support Providers with Credential Guard|website=Windows Dev Center|access-date=14 September 2018}} 5. ^1 {{cite web |url=https://www.andreafortuna.org/dfir/retrieving-ntlm-hashes-without-touching-lsass-the-internal-monologue-attack/|title=Retrieving NTLM Hashes without touching LSASS: the “Internal Monologue” Attack|website=andreafortuna.org|access-date=5 November 2018}} 6. ^1 {{cite web |url=https://www.blackhat.com/docs/us-16/materials/us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security-wp.pdf|title=Analysis of the attack surface of windows 10 virtualization-based security|website=blackhat.com|access-date=13 November 2018}} 7. ^1 {{cite web |url=https://insights.adaptiva.com/2018/windows-10-credential-guard-security/|title=Credential Guard Cheat Sheet|website=insights.adaptiva.com|access-date=13 November 2018}} }}{{Windows Components}}Category:Windows 10Category:Microsoft Windows security technology |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。