Webinar 1514 Slides
Webinar 1514 Slides
Made possible by
Thanks to
1
8/23/2018
A few quick
facts about the
Structure
Data storage capabilities
registry Registry permissions
32/64 bit
2
8/23/2018
3
8/23/2018
https://www.welivesecurity.com/2017/05/15/malicious-registry-
Storage for keys-reflective-injection/
file-less https://www.theregister.co.uk/2014/08/04/registryinfecting_reb
ootresisting_malware_has_no_files/
malware https://www.redcanary.com/blog/windows-registry-attacks-
threat-detection/
Exploiting Service Registry Permission’s Weaknesses to Establish
Persistence
Microsoft Windows Consent User Interface Registry Key Local Privilege Escalation Vulnerability
Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799)
allow attackers to bypass an application sandbox protection mechanism and perform unspecified registry actions via a crafted
application, aka "Windows Registry Elevation of Privilege Vulnerability.“
https://vulners.com/nessus/SMB_REG_WINLOGON_PERMISSIONS.NASL
https://vulners.com/osvdb/OSVDB:334
HKEY_LOCAL_MACHINE Key: SoftwareMicrosoftWindowsCurrentVersionApp Paths Key:
SoftwareMicrosoftWindowsCurrentVersionControls Folder Key: SoftwareMicrosoftWindowsCurrentVersionDeleteFiles Key:
SoftwareMicrosoftWindowsCurrentVersionExplorer Key: SoftwareMicrosoftWindowsCurrentVersionExtensions Key:
SoftwareMicrosoftWindowsCurrentVersionExtShellViews Key: SoftwareMicrosoftWindowsCurrentVersionInternet Settings
Key: SoftwareMicrosoftWindowsCurrentVersionModuleUsage Key: SoftwareMicrosoftWindowsCurrentVersionRenameFiles
Next user
HKEY_LOCAL_MACHINE Key: SoftwareMicrosoftWindowsCurrentVersionRun Key:
SoftwareMicrosoftWindowsCurrentVersionRunOnce Key: SoftwareMicrosoftWindowsCurrentVersionRunOnceEx Key:
SoftwareMicrosoftWindows NTCurrentVersionAeDebug Key: SoftwareMicrosoftWindows NTCurrentVersionImage File
Execution Options Administrators Group: Full Control System: Full Control Everyone: Read
Short Description
It is possible for non-administrative users to create a program and set it to run by the next user who logs on. Unauthorized
access rights could be obtained if the next user to log on has administrative rights.
https://vulners.com/api/v3/search/id/?id=SMB_REG_RUN_PERMISSIONS.NASL
AlwaysInstallElevated
ensure that only Administrators may set registry key values under HKLM\Software\Clsid - Interactive only needs the read permission. On
web servers that allow publishing, it is crucial to ensure that these issues don't exist as this attack can be launched using ASP.
4
8/23/2018
Registry
security Permissions
Auditing
5
8/23/2018
Registry
permissions
6
8/23/2018
Audit policy at
the system
level
7
8/23/2018
Audit policy at
the key level
8
8/23/2018
Control
registry key
permissions
and audit
policy centrally
via Group
Policy
9
8/23/2018
Don’t think you are going to monitor each change to the registry
on even one system – let alone thousands
Even autoruns
Don’t monitor new systems until everything installed
Then classes of similar systems will settle into a routine of which
What should autorun keys are modified on a regular basis
you do? Especially with upgrades
How to catch file-less malware using the registry for storage?
Scan for large data values?
Cat-and-mouse
Attackers may
Pay attention to which EXEs modify the registry and which keys
Baseline that
Do your own hunts for secrets improperly stored in the registry
10
8/23/2018
Netwrix Auditor
Visibility platform for user behavior analysis
and risk mitigation
Netwrix Auditor
About Netwrix A visibility platform for user behavior analysis and risk mitigation
11
8/23/2018
Netwrix Auditor for Netwrix Auditor for Netwrix Auditor for Netwrix Auditor for
Windows File Servers EMC NetApp SharePoint
Netwrix Auditor for Netwrix Auditor for Netwrix Auditor for Netwrix Auditor for
Oracle Database SQL Server Windows Server VMware
Registry
Changes
12
8/23/2018
Windows
Server
Configurations
Netwrix
Auditor Alerts
13
8/23/2018
Changes to
Local Users
and Groups
User Activity
Video
Recording
14
8/23/2018
Your Employees
Are Your Biggest Risk
Security
Awareness
Program
15