๐ Secure Bits ๐ก
๐๐ฎ๐ฟ๐๐ฒ๐๐๐ถ๐ป๐ด ๐ฃ๐น๐ฎ๐ถ๐ป๐๐ฒ๐
๐ ๐ฃ๐ฎ๐๐๐๐ผ๐ฟ๐ฑ๐ ๐ถ๐ป ๐ช๐ถ๐ป๐ฑ๐ผ๐๐
Where are your secrets hiding?
Youโd be surprised how often I can extract plaintext credentials during assessments โ even in environments with Credential Guard enabled.
In this carousel, Iโll walk you through multiple real attack surfaces โ and how to prevent them:
๐ธ ๐ ๐ฆ๐ง๐ฆ๐ (๐ฅ๐ฒ๐บ๐ผ๐๐ฒ ๐๐ฒ๐๐ธ๐๐ผ๐ฝ ๐๐น๐ถ๐ฒ๐ป๐)
Even with Credential Guard, passwords can be extracted from the MSTSC process memory during RDP sessions.
๐ Not protected by Credential Guard
๐ก Use PAW, Tiering, and smartcards (even those have caveats)
๐ธ ๐ฆ๐ฒ๐ฟ๐๐ถ๐ฐ๐ฒ ๐๐ฐ๐ฐ๐ผ๐๐ป๐๐
If services run under basic Active Directory account, the password can be dumped directly from registry using SYSTEM rights.
๐ No configuration needed โ default behavior
๐ก Use gMSA, VSA, or minimize privileges
๐ธ ๐ช๐๐ถ๐ด๐ฒ๐๐
WDigest used to store plaintext passwords by default (pre-Win10). Still exploitable via registry tweak.
๐ Enabled via registry: HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\UseLogonCredential:1
๐ก Protected Users group or Credential Guard prevent this
๐ธ ๐๐ฒ๐ณ๐ฎ๐๐น๐ ๐๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐๐ฒ๐น๐ฒ๐ด๐ฎ๐๐ถ๐ผ๐ป
With โAllow delegating default credentials,โ passwords are cached during initial logon for RDP SSO logins.
๐ Enabled via GPO / registry: Computer Configuration\Administrative Templates\System\Credentials Delegation\Allow delegeting default credentials
๐ก Avoid, or use Restricted Admin / Remote Credential Guard
๐ธ ๐ช๐ถ๐ป๐ฑ๐ผ๐๐ ๐๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐ฟ
Storing credentials in Windows Credential Manager can expose them to an adversary. For example mapped drives using alternate credentials leave those secrets in LSASS.
๐ No special config โ happens when user selects โUse different credentialsโ
๐ก Block for admins via GPO: Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow storage of passwords and credentials for network authentication
๐ ๐๐ฟ๐ฒ๐ฑ๐ฒ๐ป๐๐ถ๐ฎ๐น ๐ด๐ฎ๐๐ต๐ฒ๐ฟ๐ถ๐ป๐ด ๐ถ๐ ๐ฒ๐ฎ๐๐ โ ๐ฑ๐ผ๐ปโ๐ ๐บ๐ฎ๐ธ๐ฒ ๐ถ๐ ๐ฒ๐๐ฒ๐ป ๐ฒ๐ฎ๐๐ถ๐ฒ๐ฟ
๐ฌ Which of these still exists in your environment?
๐ Swipe through, check your systems, and let me know which surprised you most.
