The “Medium Risk” Finding That’s Destroying Your Security Program

  • Home
  • Blog
  • The “Medium Risk” Finding That’s Destroying Your Security Program
The “Medium Risk” Finding That’s Destroying Your Security Program

Many of our clients perform vulnerability scanning on a regular basis but find that they still don’t perform as well as they’d like on penetration tests. Well today we’re going to discuss a finding that’s frequently found on networks, that many vulnerability scanners consider a Medium Risk, and that usually ends in objective achievement. We’re talking about the not requiring SMB Signing.

What is SMB Signing

SMB signing aids in preventing man in the middle attacks by allowing the recipient of SMB communications to confirm the authenticity of packets received. Unfortunately, Nessus considers this only a medium risk finding as shown here, which cause organizations to gloss over it. One could argue that by itself, “SMB Signing not required” is a medium risk to an organization but we find it’s often chained with other misconfigurations to create a perfect opportunity for an attacker to take over an environment.

Typical Attack Scenario

After basic enumeration, one of the first tools attackers will often start is Responder which is a poisoner tool that responds to various network requests such as LLMNR requests as detailed here. Easy configuration changes allow a malicious actor to chain this with machines that don’t require SMB signing to simply relay SMB authentications by using tools like MultiRelay.py or ntlmrelayx.py. This allows an attacker to land on a machine without ever knowing the password or bothering to crack password hashes. Once on a system, attackers often dump hashes from the machine and attempt to spray those credentials across the network to obtain additional access and with the hopes of landing on a machine with a Domain Administrator hash stored on it. An interesting alterative is to run “mimi” which is a form of Mimikatz that can dump cleartext credentials from a machine.

SMB relaying onto a machine with Responder and MultiRelay.py

Remediation

SMB Signing has 3 configuration options: Disabled, Enabled, and Required. Required is the most secure option and the one we most often recommend our clients use. Microsoft has additional information on how to configure this setting here along with basic signing information for SMB1 and SMB2 here. In general, it’s done through group policy changes by setting “Digitally Sign Communications” to “Always”. To further protect from this style of attack it’s recommended to disable LLMNR and NBNS/NetBIOS which you can find additional information on here.

Leave a Reply

Your email address will not be published. Required fields are marked *