Enough time has passed now that we are starting to see the outcomes of this methodology, which I'd like to talk to you about:
Strip away the brands, the tools, the people, and everything else, and you are left with the only thing that REALLY matters:
The problem.
The problem that APM seeks to solve is the persistent availability and reliability of attack paths.
Pentesters, red teamers, and real attackers have been abusing attack paths, specifically in Active Directory, for over 20 years. AD attack paths are INSANELY reliable. They can be abused with reliable tools, including legitimate admin tools like Powershell and PsExec.
Think about that: 20 years of abusing AD attack paths. 20 years is a generation of people. In the world of computers, 20 years is an eternity of eternities.
We should not be talking about attack paths 20 years from now.
There are various tools implementing Attack Path Management, including BloodHound Enterprise. Our customers are using BHE to knock out millions, even billions of attack paths in their AD environments in a matter of days and weeks.
It has gotten to the point where our own red team, and some of our red team friends in the industry, simply cannot escalate rights in AD anymore where BHE is deployed. That's a huge, huge, huge win for our customers and the methodology itself.
Eventually we will put together a formal report sharing the statistics we are seeing with BHE and make it freely available to everyone. Until then, you can learn more about BHE here: bloodhoundenterprise.io
• • •
Missing some Tweet in this thread? You can try to
force a refresh
This service is accessible to every VM in Azure. As far as I know, there's no reason to ever disable this service for a VM, so it should always be accessible to every Azure VM.
IMDS's REST API is available to each VM at the non-routable, local IP of 169.254.169.254.
Lina is writing the technical content our industry needs: deeply technical, clearly explained, and appropriate for both offense and defense audiences. See her writings here: inversecos.com
“Attackers think in graphs. Defenders think in lists. As long as this is true, attackers win.”
If you’ve seen more than one of my talks, you might think I’m contractually obligated to include this quote in every talk I do.
This quote means a lot to me. A LOT. Graph theory, to me, almost seems like it was invented solely for the information security field. Its purpose and reach is obviously waaaaaaay further than our field, but…
… we have BARELY scratched the surface of what’s possible with applied graph theory in information security. The core feature of #BloodHound is finding the shortest path between two nodes. The algorithm this is based on was first published in 1959.
There are worlds of untapped security research opportunities in Azure - growing, dynamic, and multiplying worlds. The next few years will produce amazing research. Get a head start with the following resources: