This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject

NetWitness Community

  • Home
  • Products
    • NetWitness Platform
      • Advisories
      • Documentation
        • Platform Documentation
        • Known Issues
        • Security Fixes
        • Hardware Documentation
        • Threat Content
        • Unified Data Model
        • Videos
      • Downloads
      • Integrations
      • Knowledge Base
    • NetWitness Cloud SIEM
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Detect AI
      • Advisories
      • Documentation
      • Knowledge Base
    • NetWitness Investigator
    • NetWitness Orchestrator
      • Advisories
      • Documentation
      • Knowledge Base
      • Legacy NetWitness Orchestrator
        • Advisories
        • Documentation
  • Community
    • Blog
    • Discussions
    • Events
    • Idea Exchange
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Community Support Forum
      • Community Support Articles
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Training
    • Blog
    • Certification Program
    • Course Catalog
      • Netwitness XDR
      • EC-Council Training
    • New Product Readiness
    • On-Demand Subscriptions
    • Student Resources
    • Upcoming Events
    • Role-Based Training
  • Technology Partners
  • Trust Center
Sign InRegister Now
Enter a search word
    Turn off suggestions
    Enter a search word
      Turn off suggestions
      Enter a user name or rank
        Turn off suggestions
        Enter a search word
          Turn off suggestions
          Enter a search word
            Turn off suggestions
            cancel
            Turn on suggestions
            Showing results for 
            Search instead for 
            Did you mean: 
            NetWitness Community Blog
            Subscribe to the official NetWitness Community blog for information about new product features, industry insights, best practices, and more.
            Enter a search word
              Turn off suggestions
              Enter a search word
                Turn off suggestions
                Enter a user name or rank
                  Turn off suggestions
                  Enter a search word
                    Turn off suggestions
                    Enter a search word
                      Turn off suggestions
                      cancel
                      Turn on suggestions
                      Showing results for 
                      Search instead for 
                      Did you mean: 
                      • NetWitness Community
                      • Blog
                      • PetitPotam NTLM Relay Attack

                      PetitPotam NTLM Relay Attack

                      jeethmathai
                      Occasional Contributor jeethmathai Occasional Contributor
                      Occasional Contributor
                      Options
                      • Subscribe to RSS Feed
                      • Mark as New
                      • Mark as Read
                      • Bookmark
                      • Subscribe
                      • Printer Friendly Page
                      • Report Inappropriate Content
                      ‎2021-09-21 04:55 PM

                      Introduction

                      Lionel Gilles, a French-based Offensive Computer Security researcher at Sogeti, an IT services company based in Paris, France recently published a PoC tool called PetitPotam, which exploits the MS-EFSRPC (Encrypting File Services Remote Protocol).

                      This affects organizations that utilize Microsoft Active Directory Certificate Services, (AD CS) a public key infrastructure (PKI) server.

                      PetitPotam is considered a NTLM (NT LAN Manager) relay attack, a form of manipulator-in-the-middle attack. 

                       

                      Attack Scenario

                      Threat actors can completely take over a Windows domain with AD CS running without any authentication — they simply need to connect the target server to the LSARPC named pipe with interface c681d488-d850-11d0-8c52-00c04fd90f7e. This allows the attacker to leverage LSARPC to communicate with the Encrypting File System Remote Protocol (MS-EFSRPC) which appears to allow unauthenticated access to provoke an NTLM authentication, which can be then captured via HTTP.

                      1. Attackers provoke NTLM authentication from DC to a machine they control using MS-EFSRPC / MS-RPRN (PetitPotam)
                      2. NTLM Relay back to DC (reflection) AD CS to get a cert for DC
                      3. Upgrade DC cert to DC TGT
                      4. Windows domain compromised

                      During testing, we identified some methods to detect the exact behavior associated with some PetitPotam actions such as Windows events with 4624, 5140 event IDs ending in an ANONYMOUS LOGON

                      Screenshot 2021-09-21 205932.png

                       

                      The following app rules, which are available on the Netwitness live server, help detect PetitPotam activity in the environment

                      • Anonymous NTLM logon detected
                      • Possible PetitPotam authentication exploit attempt*

                      Screenshot 2021-09-21 173401.png

                      Screenshot 2021-09-21 173510.png

                      *Note : This does require auditing of detailed file share to be enabled resulting in 5145 Windows Event ID

                      The SMB_lua and DCERPC parsers were also updated to register action meta from EFSRPC named pipe operations.

                      filename: efsrpc

                      action:  EfsRpcOpenFileRaw*

                      *Note: This parser does not by itself indicate a PetitPotam exploit attempt. It only provides visibility of EFSRPC operations issued by a client. Determination that an operation represents an exploit attempt is not directly possible for either parser. Rather analysis of all meta from a session may help an analyst make that determination, or that further investigation may be warranted.

                       

                      References:

                      https://msrc.microsoft.com/update-guide/vulnerability/ADV210003

                      InfoSec Handlers Diary Blog (sans.edu)

                      AD CS/PKI template exploit via PetitPotam and NTLMRelayx, from 0 to DomainAdmin in 4 steps | Franky's WebSite (bussink.net)

                       

                      Labels:
                      • Announcements
                      • Features
                      • Use Cases
                      • AD CS
                      • NTLM Relay Attack
                      • PetitPotam
                      • Windows
                      1 Like

                      You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.

                      • Comment
                      Latest Articles
                      • Using NetWitness to Detect Phishing reCAPTCHA Campaign
                      • Netwitness Platform Integration with Amazon Elastic Kubernetes Service
                      • Netwitness Platform Integration with MS Azure Sentinel Incidents
                      • Netwitness Platform Integration with AWS Application Load Balancer Access logs
                      • The Sky Is Crying: The Wake of the 19 JUL 2024 CrowdStrike Content Update for Microsoft Windows and ...
                      • The Sky Is Crying: The Wake of the 19 JUL 2024 CrowdStrike Content Update for Microsoft Windows and ...
                      • New HotFix: Addresses Kernel Panic After Upgrading to 12.4.1
                      • Automation with NetWitness: Core and NetWitness APIs
                      • HYDRA Brute Force
                      • DDoS using BotNet Use Case
                      Labels
                      • Announcements 64
                      • Events 12
                      • Features 12
                      • Integrations 15
                      • Resources 68
                      • Tutorials 32
                      • Use Cases 31
                      • Videos 119
                      li.common.scroll-to.top
                      Powered by Khoros
                      • Blog
                      • Events
                      • Discussions
                      • Idea Exchange
                      • Knowledge Base
                      • Case Portal
                      • Community Support
                      • Product Life Cycle
                      • Support Information
                      • About the Community
                      • Terms & Conditions
                      • Privacy Statement
                      • Acceptable Use Policy
                      • Employee Login
                      © 2022 RSA Security LLC or its affiliates. All rights reserved.
                      Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
                      Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.