Microsoft ATA

General

  • Traffic destined for Domain Controllers is mirrored to ATA sensors

  • Use activity profile is build over time, i.e.

    • use of computers

    • credentials

    • log on machines

  • Collects Event 4776 (The DC attempted to validate the credentials for an account) to detect credential replay attacks

  • Can detect behavioral anomalies

  • Useful for detecting:

    • Recon: account enum, netsession enum

    • Compromised Credentials Attacks: bruteforce, high privilege account/service account exposed in clear text, honey token, unusual protocol (NTLM and Kerberos)

    • Credential/Hash/Ticket Replay attacks

Bypassing ATA

  • Avoid talking to the DC as long as possible

  • Try to blend in with normal traffic

Last updated