Operations
3/4/2016
02:45 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Free 'DCEPT' Tool Entraps Attackers Stealing Admin Credentials

SecureWorks researchers offer their homegrown 'honeytoken' detection tool as open-source.

SAN FRANCISCO, CALIF. – RSA Conference 2016 – Researchers with Dell SecureWorks here this week released an open-source homegrown tool that detects when attackers attempt to steal Windows Active Directory domain administrator credentials.

The so-called DCEPT (Domain Controller Enticing Password Tripwire) tool is basically a deception-style “honeytoken” approach to catch the bad guys in the act of scraping domain credentials: it uses phony usernames and passwords for the domain administrator and an intrusion detection mechanism that goes into effect when the attacker takes the bait.

James Bettke, a security researcher with SecureWorks who along with director of malware research Joe Stewart co-wrote the tool, says they were looking to solve the domain credential theft problem that plagues organizations hit by advanced attacks such as cyber espionage. “We wrote an agent component caching fake credentials... and a second component looks for their use on the network,” Bettke says. “We thought, ‘why not release it as open source?’”

Pilfered network administrator credentials are a popular way for attackers to pivot from an infected user machine to full access to the victim organization’s network and servers, and ultimately, their sensitive data. Attackers typically scrape the credentials from system memory, and use those keys to the kingdom to burrow further into the network and steal information.

“They try to scrape additional credentials out of memory, looking for the domain password. If they get that out of memory, they go from being an intruder on a single system to controlling your entire network,” Bettke says. “We thought, wouldn’t it be cool to detect that.”

DCEPT works like this: it places phony credentials on the network as a lure. So if an attacker tries to pull cached credentials from a server, DCEPT detects the activity and then alerts a SIEM or other monitoring mechanism. DCEPT comes as a Docker container build for its server component, Stewart says.

The tool decrypts Kerberos pre-authentication packets and inspects them to see if they were the fake passwords being used in the network. Bettke says the tool could be expanded to support other types of “tripwires” such as database entries or email addresses.

DCEPT, which is available on GitHub, has three components: an agent that places fake credentials into memory (and refreshes them); a generation server that creates random passwords for the lure; and a sniffer, which searches for and detects abuse of the phony credentials.

Related Content:

 

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
3/11/2016 | 12:20:28 PM
Re: Poking the bear
It's definitely not for every organization, but deception-based technology is gradually becoming more palatable and strategic for orgs that have the resources to handle it. 
RyanSepe
0%
100%
RyanSepe,
User Rank: Ninja
3/7/2016 | 9:22:22 AM
Poking the bear
I do have some hesitations with this method however and honeypots/nets in general. Network scraping/memory scraping is common practice and more often than not a company knows or should know whether they are equipped to combat it or if they are vulnerable. Once the attacker discovers the credentials rendered are phony it might sway them to target the ip space they were scrapping more heavily then before. Mind you, unless targeting, they may have been doing this to a myriad of ip spaces trying to get lucky.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
3/7/2016 | 9:19:10 AM
Interesting
I did not expect the expansion of honeypot principles into a token based concept. It would be interesting to identify by what means your network is being scraped for those credentials when there is less of a risk because they are phony.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.