Skeleton Key
General
Patch a Domain Controller (lsass process) so that it allows access as any user with a single password
Discovered in malware named Skeleton Key malware
All publicly known methods are NOT persistent accross reboots
Mimikatz to the rescue
Exploitation
Detection
Events:
7045: A service was installed in the system (Type: Kernel Mode Driver)
4624: Account Logon
4634: Account Logoff
4672: Admin Logon
Events("Audit Privilege Use" must be enabled)
4673: Sensitive Privilege Use
4611: A trusted logon process has been registered with the Local Security Authority
Mitigation
Run lsass.exe as a protected process, as it forces an attacker to load a kernel mode driver -> log detection
Test before implementing, as many drivers and plguins may not load with the protection
Last updated