Skip to content

Latest commit

 

History

History
76 lines (59 loc) · 2.7 KB

MS-DFSNM.md

File metadata and controls

76 lines (59 loc) · 2.7 KB

Protocol:

Interface UUID:

  • 4FC742E0-4A10-11CF-8273-00AA004AE673

Server Binary:

  • dfssvc.exe (On Domain Controller)

Endpoint:

  • ncacn_np: \\pipe\netdfs

ATT&CK Relation:

Indicator of Activity (IOA):

  • Network:

    • Inbound network connection over port 445 to the System Process (PID=4)

    • Connection over pipe netdfs

    • Methods:

      • NetrDfsRemoveStdRoot (potentially more, only tested method)
  • Host:

    • (Server Side):

      • Event ID 5156

      • Account Name: domain user

      • Object Type: File

      • Share Name: \\*\IPC$

      • Relative Target Name: netdfs

      • Access Mask: 0x12019F

      • Source Address: Address of where request is coming from. Good for context during investigation.

      • Accesses:

        • ReadData (or ListDirectory)
        • WriteData (or AddFile)
      • Event ID 4624

        • Logon Type: 3
        • Account Name: domain user
        • Process ID: 0x0
        • Elevated Token: Yes
        • Authentication Package: NTLM (by defualt of PoC, subject to change and could be Kerberos)
    • Join on LogonID for queries.

Prevention Opportunities:

Notes:

  • The Dfs Service is running by default on Domain Controllers, so it might break functionality to turn this service off or disable it.
  • If you don't want to assign DA's to this DACL, so it might be best to create a specific group to this action. Change DACL to leverage the group SID - like : D:(A;;CC;;;S-1-5-21-3637186843-3378876361-2759896766-2106).

Useful Resources:

PoC: https://github.com/Wh04m1001/DFSCoerce