The adage “assume breach” drives awareness that attackers will find a way onto an endpoint in the Domain. After establishing control on an endpoint, they are looking for ways to create persistence that will enable their campaign, and then execute when the time is perfect.
Reducing the attack surface to keep the lights on
Active Directory exposes critical assets in production of global energy offerings to the market
From every endpoint in the domain environment, reconnaissance and lateral movement to a domain admin position is likely in post-infiltration activity.
Javelin Networks uses lightweight, automated methods to discover attack surface in Active Directory to include Domain Controllers, GPOs, endpoints, servers, and Kerberos while providing client with recommended remediations.
Javelin ADAssess illuminated Local Admin traversal Dark Corners which indicate weak control over Local Admin accounts.
Additionally, Poweruser Enumeration Dark Corners where users had a password for Domain Admin that never expires were found.
Additionally, legacy features were enabled, such as LLMNR.
This feature exposes endpoints to reconnaissance and man in the middle attacks.
The client was unaware of the susceptibility to those threats and vulnerability of the settings.
Active Directory as the ultimate countermeasure
Javelin AD|Protect turns Active Directory into an Intrusion Detection and Containment system. Using an advanced, Domain forensic methodology, AD|Protect controls the attacker’s perception and uses it against them.
Capture Patient Zero
Letting an attacker roam an environment from Patient Zero yields full Domain compromise, putting every asset and enlisted at risk. By using the attacker’s perspective against them, Javelin AD|Protect automates the discovery of Patient Zero.
Shorten containment time
Counterintelligence can shorten containment time, allowing for a strong defensive position to protect core assets. Using Domain-specific incident response methodologies, an autonomous capability launches forensics for memory and file system artifacts.
Reduce alert fatigue
Increasing cyber resilience will raise the cost for the attacker, discourage additional attacks, and allow responders to study advancement in the attacker’s breach tactics. Near real-time containment at the point of breach in the Domain will decrease collateral damage and improve resource utilization by reducing alert fatigue.
Reduce attack surface
Attackers leave backdoors and hooks in the Domain that are used to persist privileges and exploit Active Directory. AD|Protect uncovers attacks in progress and evidence left behind to mitigate risk in real-time, all the time.
Javelin vs Microsoft ATA
This video demonstrates a common Domain attack and the results from both Javelin AD|Protect and Microsoft ATA.