Английская Википедия:Credential Guard

Материал из Онлайн справочника
Версия от 07:46, 22 февраля 2024; EducationBot (обсуждение | вклад) (Новая страница: «{{Английская Википедия/Панель перехода}} {{Short description|Computer operating system component}} '''Credential Guard''' is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks.<REF name="Protect derived domain credentials with Windows Defender Credential Guard"/><ref name="Analy...»)
(разн.) ← Предыдущая версия | Текущая версия (разн.) | Следующая версия → (разн.)
Перейти к навигацииПерейти к поиску

Шаблон:Short description Credential Guard is a virtualization-based isolation technology for LSASS which prevents attackers from stealing credentials that could be used for pass the hash attacks.[1][2][3][4] Credential Guard was introduced with Microsoft's Windows 10 operating system.[1] As of Windows 10 version 20H1, Credential Guard is only available in the Enterprise edition of the operating system.

Summary

After compromising a system, attackers often attempt to extract any stored credentials for further lateral movement through the network. A prime target is the LSASS process, which stores NTLM and Kerberos credentials. Credential Guard prevents attackers from dumping credentials stored in LSASS by running LSASS in a virtualized container that even a user with SYSTEM privileges cannot access.[5] The system then creates a proxy process called LSAIso (LSA Isolated) for communication with the virtualized LSASS process.[6][3][7]

Bypass techniques

There are several generic techniques for stealing credentials on systems with Credential Guard:

  • A keylogger running on the system will capture any typed passwords.[8][3]
  • A user with administrator privileges can install a new Security Support Provider (SSP). The new SSP will not be able to access stored password hashes, but will be able to capture all passwords after the SSP is installed.[8][9]
  • Extract stored credentials from another source, as is performed in the "Internal Monologue" attack (which uses SSPI to retrieve crackable NetNTLMv1 hashes). [10]

References

Шаблон:Reflist

Шаблон:Windows Components

  1. 1,0 1,1 Ошибка цитирования Неверный тег <ref>; для сносок Protect derived domain credentials with Windows Defender Credential Guard не указан текст
  2. Ошибка цитирования Неверный тег <ref>; для сносок Analysis of the attack surface of windows 10 virtualization-based security не указан текст
  3. 3,0 3,1 3,2 Ошибка цитирования Неверный тег <ref>; для сносок Windows Internal 7 - Volume 1 не указан текст
  4. Ошибка цитирования Неверный тег <ref>; для сносок Credential Guard Cheat Sheet не указан текст
  5. Ошибка цитирования Неверный тег <ref>; для сносок Deep Dive into Credential Guard, Credential Theft & Lateral Traversal не указан текст
  6. Ошибка цитирования Неверный тег <ref>; для сносок Windows 10 Device Guard and Credential Guard Demystified не указан текст
  7. Ошибка цитирования Неверный тег <ref>; для сносок ATT&CK Credential Dumping не указан текст
  8. 8,0 8,1 Ошибка цитирования Неверный тег <ref>; для сносок Windows Credential Guard & Mimikatz не указан текст
  9. Ошибка цитирования Неверный тег <ref>; для сносок Third party Security Support Providers with Credential Guard не указан текст
  10. Ошибка цитирования Неверный тег <ref>; для сносок Retrieving NTLM Hashes without touching LSASS: the “Internal Monologue” Attack не указан текст