Service Accounts are Dangerous

๐Ÿ”’ Secure Bits ๐Ÿ’ก
Do you know ๐˜„๐—ต๐˜† ๐˜„๐—ฒ ๐—ฐ๐—ผ๐—ป๐—ณ๐—ถ๐—ด๐˜‚๐—ฟ๐—ฒ ๐—น๐—ผ๐—ป๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—น๐—ฒ๐˜… ๐—ฝ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ๐˜€ for service accounts?

๐Ÿ›‘ Itโ€™s not because theyโ€™re harder to extract from Windows OS. In fact, ๐—ฑ๐˜‚๐—บ๐—ฝ๐—ถ๐—ป๐—ด ๐—ฎ ๐˜€๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฎ๐—ฐ๐—ฐ๐—ผ๐˜‚๐—ป๐˜ ๐—ฝ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐˜๐—ฎ๐—ธ๐—ฒ๐˜€ ๐—ท๐˜‚๐˜€๐˜ ๐˜€๐—ฒ๐—ฐ๐—ผ๐—ป๐—ฑ๐˜€.

The real reason? ๐—ž๐—ฒ๐—ฟ๐—ฏ๐—ฒ๐—ฟ๐—ผ๐—ฎ๐˜€๐˜๐—ถ๐—ป๐—ด. Attackers can request service tickets and brute-force the passwords offline. Iโ€™ll cover that in another post.

๐Ÿšจ ๐—•๐˜‚๐˜ ๐—ต๐—ฒ๐—ฟ๐—ฒโ€™๐˜€ ๐˜๐—ต๐—ฒ ๐—ฟ๐—ฒ๐—ฎ๐—น ๐—ฑ๐—ฎ๐—ป๐—ด๐—ฒ๐—ฟโ€ฆ
If your service account is a Domain Admin, and a third-party vendor manages that application, youโ€™re basically giving them Domain Admin rightsโ€”anytime.

Hereโ€™s how to dump service passwords:
1๏ธโƒฃ The service is running with SQLAdminSVC.
2๏ธโƒฃ That account is a Domain Admin (yes, I see this too often in audits).
3๏ธโƒฃ An attacker elevates to SYSTEMโ€”which is easy and legitimate in Windows OS.
4๏ธโƒฃ The plaintext password is extracted in seconds.

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฝ๐—ฟ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜ ๐˜๐—ต๐—ถ๐˜€?
โœ” If possible do not use Domain User accounts for services.
โœ” Use GMSA (Group Managed Service Accounts), VSA or carefully delegate.
โœ” Implement a Tiering Model to prevent privilege escalation.

Do you like this topic ? Check out my course๐Ÿ‘‡
https://horizon-secured.com/courses/windows-infrastructure-security/

Are you tracking where your service accounts are running and what privileges they have?