T1201 Password Policy Discovery
Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through Brute Force. This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as ‘pass123’; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts).
Password policies can be set and discovered on Windows, Linux, and macOS systems via various command shell utilities such as net accounts (/domain), Get-ADDefaultDomainPasswordPolicy, chage -l , cat /etc/pam.d/common-password, and pwpolicy getaccountpolicies 3 2. Adversaries may also leverage a Network Device CLI on network devices to discover password policy information (e.g. show aaa, show aaa common-criteria policy all).4
Password policies can be discovered in cloud environments using available APIs such as GetAccountPasswordPolicy in AWS 1.
| Item | Value |
|---|---|
| ID | T1201 |
| Sub-techniques | |
| Tactics | TA0007 |
| Platforms | IaaS, Linux, Network, Windows, macOS |
| Version | 1.5 |
| Created | 18 April 2018 |
| Last Modified | 06 September 2022 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S0521 | BloodHound | BloodHound can collect password policy information on the target environment.9 |
| G0114 | Chimera | Chimera has used the NtdsAudit utility to collect information related to accounts and passwords.12 |
| S0488 | CrackMapExec | CrackMapExec can discover the password policies applied to the target system.8 |
| S0236 | Kwampirs | Kwampirs collects password policy information with the command net accounts.10 |
| S0039 | Net | The net accounts and net accounts /domain commands with Net can be used to obtain password policy information.7 |
| G0049 | OilRig | OilRig has used net.exe in a script with net accounts /domain to find the password policy of a domain.11 |
| C0012 | Operation CuckooBees | During Operation CuckooBees, the threat actors used the net accounts command as part of their advanced reconnaissance.14 |
| S0378 | PoshC2 | PoshC2 can use Get-PassPol to enumerate the domain password policy.6 |
| G0010 | Turla | Turla has used net accounts and net accounts /domain to acquire password policy information.13 |
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| M1027 | Password Policies | Ensure only valid password filters are registered. Filter DLLs must be present in Windows installation directory (C:\Windows\System32\ by default) of a domain controller and/or local computer with a corresponding entry in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages. 5 |
Detection
| ID | Data Source | Data Component |
|---|---|---|
| DS0017 | Command | Command Execution |
| DS0009 | Process | Process Creation |
| DS0002 | User Account | User Account Metadata |
References
-
Amazon Web Services. (n.d.). AWS API GetAccountPasswordPolicy. Retrieved June 8, 2021. ↩
-
Holland, J. (2016, January 25). User password policies on non AD machines. Retrieved April 5, 2018. ↩
-
Matutiae, M. (2014, August 6). How to display password policy information for a user (Ubuntu)?. Retrieved April 5, 2018. ↩
-
US-CERT. (2018, April 20). Alert (TA18-106A) Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices. Retrieved October 19, 2020. ↩
-
Microsoft. (n.d.). Installing and Registering a Password Filter DLL. Retrieved November 21, 2017. ↩
-
Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019. ↩
-
Savill, J. (1999, March 4). Net.exe reference. Retrieved September 22, 2015. ↩
-
byt3bl33d3r. (2018, September 8). SMB: Command Reference. Retrieved July 17, 2020. ↩
-
Red Team Labs. (2018, April 24). Hidden Administrative Accounts: BloodHound to the Rescue. Retrieved October 28, 2020. ↩
-
Symantec Security Response Attack Investigation Team. (2018, April 23). New Orangeworm attack group targets the healthcare sector in the U.S., Europe, and Asia. Retrieved May 8, 2018. ↩
-
Singh, S., Yin, H. (2016, May 22). https://www.fireeye.com/blog/threat-research/2016/05/targeted_attacksaga.html. Retrieved April 5, 2018. ↩
-
Jansen, W . (2021, January 12). Abusing cloud services to fly under the radar. Retrieved January 19, 2021. ↩
-
Faou, M. (2020, May). From Agent.btz to ComRAT v4: A ten-year journey. Retrieved June 15, 2020. ↩
-
Cybereason Nocturnus. (2022, May 4). Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques. Retrieved September 22, 2022. ↩