Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Authentication

// // //
9/17/2019
12:00 PM
Joe Stanganelli
Joe Stanganelli
Joe Stanganelli

Analytics Startup Claims to Turn Golden Tickets Brass

The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.

A devastating five-year old vulnerability in basic authentication systems may finally have a solution -- but it's really hard.

Typically, encryption and other IT security solutions rely on the fundamental presumption that the very first step of user authentication works and can be fully trusted. Kerberos -- a ubiquitous, decades-old authentication mechanism -- represents the core of how identity authentication works throughout the majority of enterprises worldwide. As such, it represents the roots of a tree of trust.

It is imperfect, however.

"They're all premised on this not being a lie," Jason Crabtree, CEO of data-analytics startup Qomplx (pronounced "complex"), told Security Now. "It's actually a terrible assumption to make... It doesn't mean that a single one of the authentication events is real."

Researchers at Black Hat 2014 revealed what is known as a "Golden Ticket" attack -- an exploit related to privilege-escalation attacks by forging not only tickets but also creating a forged key distribution center. For IT administrators of Windows and Linux environments that rely upon Kerberos, it is the curse that keeps on cursing.

Not much has been done about this vulnerability over the past few years -- largely because not much can be done about it. Like, to some extent, SPECTRE and MELTDOWN, the problem of Kerberos authentication has become something of a pink elephant in an otherwise well-appointed drawing room. It is very clearly there, but is impolite to talk about.

For some, the threat has been overblown. Not long after the Black Hat 2014 revelations, Roger Grimes of CSO Online argued that by applying mega-strict authentication policies bordering on draconian, just about everything can be accomplished on an enterprise network with task delegation and time limits on higher-level accounts.

"You want to make it hard for attackers to get domain admin status? Don't have any," wrote Grimes. "The most secure companies in the world have zero permanent members of their highly elevated groups [and] alert when anyone tries to add accounts to those groups."

Not everyone agrees that this is a complete solution, however. While Crabtree affirms that limiting credentials and maintaining a well-configured network are best practices, he claims that Qomplx has demonstrated a proof of concept involving ticket forgeries in the absence of permanently installed high-level users; from there, attackers were able to issue themselves these high levels of authority -- and then compromise cloud-based accounts.

Otherwise sophisticated UEBA solutions, Crabtree further explains, are likewise insufficient to counter the threat of Kerberos-authentication forgeries.

"It's like buying a seatbelt that works below 10 miles per hour and not above," said Crabtree. "It only works against adversaries that are unskilled enough that they don't bother to do the first thing a skilled adversary does -- which is [to] attribute the traffic to the wrong identification; [this] violates your ability to pinpoint any of this traffic in a behavioral basis."

Consequently, Qomplx -- which has historically been an analytics firm working with big data nonspecific to cybersecurity -- has taken the approach of going beyond metadata analysis.

The state of Kerberos authentication
The exodus from other modes of authentication to Kerberos began in the 1990s, for it solved an important problem: How do you keep authentication secure yet still properly agile -- so that the user doesn't have to manually authenticate themselves dozens or hundreds of times in a business day on the enterprise network. Unlike other authentication tools, Kerberos is a stateless protocol -- allowing one domain controller to issue a credential that can then be presented to and accepted by other domain controllers, while making ticket forgeries more difficult for attackers.

Attackers have solved this problem, however. In turn, Qomplx purports to have solved that problem in a complex (some might say "artless") way: by collecting, keeping a ledger of, and validating "every single Kerberos transaction" -- comparing known lists of valid tickets against every new authentication requests.

Describing the process as "stupid hard," Crabtree explained that Qomplx temporarily infuses statefulness into the otherwise stateless Kerberos protocol throughout the IT network. This is because the "handshake" that occurs when Kerberos issues an authentication must be actually observed to be independently verified (a nigh impossible task when Kerberos is stateless).

From there, said Crabtree, the maintenance of an external state mutes the "noisiness" across large enterprise networks, allowing Qomplx to independently identify true signatures and ensure that authentication has been properly issued.

"It's really arcane and it's really low level," said Crabtree. "Except if you do it, you are able to detect the most devastating [attacks].

Crabtree reports that Qomplx's solution has been in production for over a year and a half now -- leading to a rebranding of the company. Originally named Fractal Industries, the company focused on its offering of a big-data analytics streaming platform. Under this new banner of Qomplx, the company secured Series A funding in July.

"We didn't [originally] want to build the Kerberos solution as a business," said Crabtree. "[But] if you can't secure authentication, you can't secure the enterprise."

Related posts:

—Joe Stanganelli is managing director at research and consulting firm Blackwood King LC. In addition to being an attorney and consultant, he has spent several years analyzing and writing about business and technology trends. Follow him on Twitter at @JoeStanganelli.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.