Folks,
I hope this finds you doing well. Today, we are announcing our second global Gold Finger Mini Challenge for US $ 25,000.
The $ 25,000 Gold Finger Mini Challenge
- Who can replicate secrets (password hashes) from an Active Directory domain?
- Who can reset the password of an Active Directory domain user's account?
- Who can disable the use of Smartcards on an Active Directory account?
- Who can change an Active Directory security group's membership?
- Who can change security permissions on an Active Directory OU?
- Who can link a group policy (GPO) to an Active Directory OU?
- Who can create an Active Directory user account in an OU?
- Anyone who could replicate secrets from Active Directory, effortlessly enactable via the use of Mimikatz DCSync, could instantly compromise the credentials of all (thousands) of organizational domain user accounts resulting in a colossal breach bigger than the Solar Winds Hack.
- Anyone who could reset the password of a domain user account would in effect have instantly compromised the identity of that account, such as that of a C-Level Executive, a Software Developer etc. He/she could then login as that account and instantly obtain access to everything that account has access to. If the target were an Active Directory privileged user account, it would be tantamount to a colossal, system-wide breach.
- Anyone who could disable the use of Smartcards for interactive logon, would in effect have downgraded security on that account, forcing authentication to being password based, and a simple password reset of that domain user account could be used to instantly compromise it.
- Anyone who could change the membership of a domain security group could instantly obtain domain-wide access to all IT resources that the compromised group has access to, such as All Employees, Source-Code Access, Accounting, Cloud Global Admins etc. If the target were an Active Directory privileged group, such as Domain Admins, it would be tantamount to a colossal, system-wide breach.
- Anyone who could modify the security permissions on an Active Directory OU could easily gain privileged access on all Active Directory objects e.g. user accounts, computers, security groups, service connection points etc. that reside in that OU. In numerous ways, this could easily be used to elevate/escalate privilege and gain Domain Admin equivalent access, resulting in a colossal breach.
- Anyone who could link a GPO to an Active Directory OU could instantly control the security of all computers whose domain computer accounts reside in that OU. This could be used to easily circumvent all endpoint-protection controls, deliver malicious payloads or instantly unleash malware on thousands of domain-joined computers.
- Anyone who could create a domain user account in Active Directory could then use that account to engage in nefarious activities that couldn't be traced back to a uniquely identifiable individual, thereby enabling the perpetrator to evade accountability while engaging in nefarious recon or attack activities.
- Try the Advanced level of Gold Finger Mini, downloadable from here, to experience its unique capabilities.
- Identify any solution in the world, other than Gold Finger, that you believe can do what Gold Finger Mini can.
Specifically - Identify any solution in the world that can accurately deliver the 7 paramount insights listed above. - Compare and verify the results of the identified solution with Gold Finger Mini's results in the same AD domain. For your convenience, a ready to use lab AD domain with Gold Finger Mini pre-installed, can be downloaded from here.
- Acldiag (Microsoft)
- Aclight (CyberArk)
- Active Directory ACL Analyzer* (Paramount Defenses)
- Active Directory ACL Exporter* (Paramount Defenses)
- Active Directory Effective Permissions Calculator* (Paramount Defenses)
- Active Directory Effective Access Auditor* (Paramount Defenses)
- Active Directory Membership Auditor* (Paramount Defenses)
- Active Directory Permissions Analyzer* (Paramount Defenses)
- Active Directory Permissions Reporting Tool (ManageEngine)
- Active Directory Privileged Access Auditor* (Paramount Defenses)
- Active Directory Security Auditor* (Paramount Defenses)
- AD ACL Scanner (Robin Granberg ?)
- AD Permissions Reporter (CJWDev)
- AD Secure (Attivo Networks)
- AD Assessor (Attivo Networks)
- Alsid for AD (Alsid)
- BeyondTrust Auditor (BeyondTrust)
- Bloodhound (SpectreOps)
- CrowdStrike Falcon Identity Protection (CrowdStrike)
- Dsacls (Microsoft)
- Directory Service Protector (Semperis)
- Effective Permissions Reporting Tool (Netwrix)
- Enterprise Reporter for Active Directory (Quest)
- Hyena (Systemtools)
- LepideAuditor (Lepide)
- Permissions Analyzer for Active Directory (SolarWinds)
- Ping Castle (Ping Castle)
- PowerShell for Active Directory (Microsoft)
- Purple Knight (Semperis)
- StealthAUDIT Active Directory Permissions Analyzer (Stealthbits)
- * These tools are a part of the Gold Finger Suite and are thus not eligible for consideration
No comments:
Post a Comment