Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Researched Exploit DHCP To Escalate Privileges In Windows Domains

admin by admin
Mar 21, 2024
in News
A A
0

Researchers at Akamai have unveiled a new technique that could potentially put millions of Windows domains at risk.

This technique exploits the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Active Directory (AD) environments, a cornerstone of network management in numerous organizations worldwide.

The DHCP server, a critical component in network management, is responsible for assigning IP addresses to devices on a network.

However, when this server role is installed on a Domain Controller (DC), it opens up a Pandora’s box. Researchers have found that this configuration can be manipulated to grant attackers domain admin privileges, essentially handing them the keys to the kingdom.

Microsoft DHCP Servers

This technique does not exploit a vulnerability in the traditional sense but abuses legitimate features, making it a particularly insidious threat.

With Microsoft DHCP servers running in approximately 40% of the networks monitored by Akamai, the potential impact is vast.

Beyond privilege escalation, the technique can also be used to create a stealthy domain persistence mechanism.

Document

Free Webinar : Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

:

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

AcuRisQ, that helps you to quantify risk accurately:


This means that attackers can maintain their foothold within a network undetected, posing a significant threat to organizational security.

Given the nature of this technique, there isn’t a straightforward fix such as a patch. However, Akamai researchers have outlined detailed steps for mitigation and detection to help organizations protect themselves.

These include identifying risky DHCP configurations, mitigating relay attacks against AD Certificate Services (AD CS), practicing DHCP administrator’s group hygiene, using network segmentation, and identifying DNS anomalies, researchers said.

DHCP Coerce Technique

Dubbed “DHCP Coerce,” the technique allows attackers to coerce a DHCP server into authenticating with a machine under their control.

This can then be leveraged in a Kerberos relay attack to gain control over the server.

The implications are particularly dire if AD Certificate Services are used within the environment, as this can lead to a full domain compromise.

This discovery serves as a stark reminder of the importance of vigilance in network security.

Organizations are urged to review their DHCP server configurations, particularly those installed on DCs, and implement the recommended defensive measures.

As the digital landscape continues to evolve, so too do the tactics of those with malicious intent.

It is incumbent upon security professionals to stay ahead of these threats, ensuring the integrity and security of their networks.

The DHCP administrators group provides essential functionality, it also presents a potential risk if not managed with caution.

Akamai’s research highlights the need for a balanced approach to access management, one that secures the network without hindering operational efficiency.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.



Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.