๐ Secure Bits ๐ก
Want to ๐น๐ผ๐ฐ๐ธ ๐ฑ๐ผ๐๐ป ๐ฐ๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐ต๐ฒ๐ณ๐ ๐ถ๐ป ๐๐ฐ๐๐ถ๐๐ฒ ๐๐ถ๐ฟ๐ฒ๐ฐ๐๐ผ๐ฟ๐?
Start using the ๐ฃ๐ฟ๐ผ๐๐ฒ๐ฐ๐๐ฒ๐ฑ ๐จ๐๐ฒ๐ฟ๐ ๐ด๐ฟ๐ผ๐๐ฝโbut only if you understand what it enforces.
๐๐ฒ๐ฟ๐ฒโ๐ ๐๐ต๐ฎ๐ ๐ฏ๐ฒ๐ถ๐ป๐ด ๐ถ๐ป ๐ฃ๐ฟ๐ผ๐๐ฒ๐ฐ๐๐ฒ๐ฑ ๐จ๐๐ฒ๐ฟ๐ ๐ฑ๐ผ๐ฒ๐ ๐ฏ๐ ๐ฑ๐ฒ๐ณ๐ฎ๐๐น๐:
โ Prevents NTLM authentication (no NT hashes ever used)
โ Disables DES/RC4 encryption in Kerberos pre-auth
โ Disables CredSSP, Digest, and cached credentials
โ Forces Kerberos TGTs to 4โhour lifetime, no renewals
โ Prevents both constrained and unconstrained delegation
โ Disallows offline logonโno cached verifier stored
(๐๐ฒ๐ฒ ๐ณ๐๐น๐น ๐ฑ๐ฒ๐๐ฎ๐ถ๐น๐ ๐ถ๐ป ๐๐ต๐ฒ ๐ฐ๐ผ๐บ๐บ๐ฒ๐ป๐๐)
๐ ๐ฅ๐ฒ๐พ๐๐ถ๐ฟ๐ฒ๐บ๐ฒ๐ป๐๐ & ๐ด๐ผ๐๐ฐ๐ต๐ฎ๐:
โ Domain functional level โฅ Server 2012โฏR2
โ Accounts must support AES keys (reset older passwords if needed)
โ Donโt add service/computer accountsโtheyโll usually break
โ Avoid mass-adding Domain Admins until fully tested
By implementing Protected Users, ๐๐ผ๐ ๐๐ฎ๐ธ๐ฒ ๐ฟ๐ฒ๐ฎ๐น ๐๐๐ฒ๐ฝ๐ ๐ฎ๐ด๐ฎ๐ถ๐ป๐๐ pass-the-hash and credential replayโwithout extra tools.
How have you handled these limitations in production? Any surprises or workarounds? ๐
Author: Martin Handl โ full article: https://iqunit.com/protected-users/
