Common Information
Type | Value |
---|---|
Value |
Domain Account - T1136.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create a domain account to maintain access to victim systems. Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover user, administrator, and service accounts. With a sufficient level of access, the <code>net user /add /domain</code> command can be used to create a domain account.(Citation: Savill 1999) Such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2017-12-17 | 3 | Post Exploitation for Remote Windows Password - Hacking Articles | ||
Details | Website | 2017-09-28 | 5 | Install OpenSSH on Windows for PowerShell Core remoting via SSH | ||
Details | Website | 2017-07-24 | 28 | Office365 ActiveSync Username Enumeration | ||
Details | Website | 2017-06-30 | 0 | A pentester’s take on (Not)Petya – Sec Team Blog | ||
Details | Website | 2017-05-22 | 0 | Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19 | ||
Details | Website | 2017-05-11 | 5 | PowerShell Direct (few internals) | ||
Details | Website | 2017-01-12 | 0 | Perspective Risk's pick of the best infosec blogs of 2016 | ||
Details | Website | 2016-12-06 | 1 | Crypto Ransomware | Bridewell | ||
Details | Website | 2016-11-03 | 35 | Securing Domain Controllers to Improve Active Directory Security | ||
Details | Website | 2016-08-01 | 14 | Blindly Discover SQL Server Instances with PowerUpSQL | ||
Details | Website | 2016-06-05 | 4 | Practical Usage of NTLM Hashes | ||
Details | Website | 2016-05-18 | 14 | An interesting route to domain admin- iSCSI | Pen Test Partners | ||
Details | Website | 2016-05-03 | 7 | Using PowerShell to Identify Federated Domains | ||
Details | Website | 2016-04-06 | 0 | Five SQL Best Practices | Imperva | ||
Details | Website | 2016-03-16 | 6 | DIY: How to build your own host-based IDS (HIDS) using OSSEC | Pen Test Partners | ||
Details | Website | 2015-12-31 | 2 | Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain | ||
Details | Website | 2015-11-22 | 0 | Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync | ||
Details | Website | 2015-11-16 | 0 | Bypassing TPM-based Bitlocker – Sec Team Blog | ||
Details | Website | 2015-10-01 | 0 | PowerShell: Filter by User when Querying the Security Event Log with Get-WinEvent and the FilterHashTable Parameter · Mike F. Robbins | ||
Details | Website | 2015-03-03 | 6 | Threat Spotlight: Angler Lurking in the Domain Shadows | ||
Details | Website | 2014-11-10 | 9 | Kerberos & KRBTGT: Active Directory’s Domain Kerberos Service Account | ||
Details | Website | 2014-11-06 | 1 | Real-World Attack Scenario: From Blind, Timing-Based SQL Injection to Windows Domain Administrator | ||
Details | Website | 2014-10-22 | 6 | Simple Guide to Setup AWS Directory Service | ||
Details | Website | 2014-04-28 | 26 | Decrypting IIS Passwords to Break Out of the DMZ: Part 2 | ||
Details | Website | 2014-01-06 | 6 | Faster Domain Escalation using LDAP |