Analytics Startup Claims to Turn Golden Tickets Brass

  /     /     /  
Publicated : 23/11/2024   Category : security


Analytics Startup Claims to Turn Golden Tickets Brass


The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.



A devastating five-year old vulnerability in basic authentication systems may finally have a solution -- but its really hard.
Typically, encryption and other IT security solutions rely on the fundamental presumption that the very first step of user authentication works and can be fully trusted.
Kerberos
-- a ubiquitous, decades-old authentication mechanism -- represents the core of how identity authentication works throughout the majority of enterprises worldwide. As such, it represents the roots of a tree of trust.
It is imperfect, however.
Theyre all premised on this not being a lie, Jason Crabtree, CEO of data-analytics startup Qomplx (pronounced complex), told Security Now. Its actually a terrible assumption to make... It doesnt mean that a single one of the authentication events is real.
Researchers at Black Hat 2014
revealed
what is known as a Golden Ticket attack -- an exploit related to privilege-escalation attacks by forging not only tickets but also
creating a forged key distribution center
. For IT administrators of Windows and Linux environments that rely upon Kerberos, it is the curse that keeps on cursing.
Not much has been done about this vulnerability over the past few years -- largely because not much
can
be done about it. Like, to some extent, SPECTRE and MELTDOWN, the problem of Kerberos authentication has become something of a pink elephant in an otherwise well-appointed drawing room. It is very clearly there, but is impolite to talk about.
For some, the threat has been overblown. Not long after the Black Hat 2014 revelations, Roger Grimes of CSO Online argued that by applying mega-strict authentication policies bordering on draconian, just about everything can be accomplished on an enterprise network with task delegation and time limits on higher-level accounts.
You want to make it hard for attackers to get domain admin status? Dont have any, wrote Grimes. The most secure companies in the world have zero permanent members of their highly elevated groups [and] alert when anyone tries to add accounts to those groups.
Not everyone agrees that this is a complete solution, however. While Crabtree affirms that limiting credentials and maintaining a well-configured network are best practices, he claims that Qomplx has demonstrated a proof of concept involving ticket forgeries in the absence of permanently installed high-level users; from there, attackers were able to issue themselves these high levels of authority -- and then compromise cloud-based accounts.
Otherwise sophisticated UEBA solutions, Crabtree further explains, are likewise insufficient to counter the threat of Kerberos-authentication forgeries.
Its like buying a seatbelt that works below 10 miles per hour and not above, said Crabtree. It only works against adversaries that are unskilled enough that they dont bother to do the first thing a skilled adversary does -- which is [to] attribute the traffic to the wrong identification; [this] violates your ability to pinpoint any of this traffic in a behavioral basis.
Consequently, Qomplx -- which has historically been an analytics firm working with big data nonspecific to cybersecurity -- has taken the approach of going beyond metadata analysis.
The state of Kerberos authentication
The exodus from other modes of authentication to Kerberos began in the 1990s, for it solved an important problem: How do you keep authentication secure yet still properly agile -- so that the user doesnt have to manually authenticate themselves dozens or hundreds of times in a business day on the enterprise network. Unlike other authentication tools, Kerberos is a stateless protocol -- allowing one domain controller to issue a credential that can then be presented to and accepted by other domain controllers, while making ticket forgeries more difficult for attackers.
Attackers have solved this problem, however. In turn, Qomplx purports to have solved
that
problem in a complex (some might say artless) way: by collecting, keeping a ledger of, and validating
every single Kerberos transaction
-- comparing known lists of valid tickets against every new authentication requests.
Describing the process as stupid hard, Crabtree explained that Qomplx temporarily infuses statefulness into the otherwise stateless Kerberos protocol throughout the IT network. This is because the handshake that occurs when Kerberos issues an authentication must be actually observed to be independently verified (a nigh impossible task when Kerberos is stateless).
From there, said Crabtree, the maintenance of an external state mutes the noisiness across large enterprise networks, allowing Qomplx to independently identify true signatures and ensure that authentication has been properly issued.
Its really arcane and its really low level, said Crabtree. Except if you do it, you are able to detect the most devastating [attacks].
Crabtree reports that Qomplxs solution has been in production for over a year and a half now -- leading to a rebranding of the company. Originally named Fractal Industries, the company focused on its offering of a big-data analytics streaming platform. Under this new banner of Qomplx, the company secured Series A funding in July.
We didnt [originally] want to build the Kerberos solution as a business, said Crabtree. [But] if you cant secure authentication, you cant secure the enterprise.
Related posts:
Should All IAM Be CIAM?
California Looks to Pass Rudimentary IoT Security Legislation
Lock Up Your Laptops: Cold Boot Attacks Are Back
—Joe Stanganelli is managing director at research and consulting firm Blackwood King LC. In addition to being an attorney and consultant, he has spent several years analyzing and writing about business and technology trends. Follow him on Twitter at @JoeStanganelli.
 

Last News

▸ Some DLP Products Vulnerable to Security Holes ◂
Discovered: 23/12/2024
Category: security

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Analytics Startup Claims to Turn Golden Tickets Brass