awesome-windows-domain-hardening
Security Hardening Techniques
Provides a curated list of security hardening techniques for Windows
A curated list of awesome Security Hardening techniques for Windows.
2k stars
121 watching
265 forks
last commit: almost 6 years ago
Linked from 5 awesome lists
hardeningsecuritywindows
Awesome Windows Domain Hardening / Initial foothold | |||
| EMET | Deploy to Workstations (End of line in July 2018 - Consider keeping EMET for Windows 7 but prioritize upgrades to Windows 10 and Edge) | ||
| AppLocker | Use to block exec content from running in user locations (home dir, profile path, temp, etc) | ||
| Here you go | Hardening against DMA Attacks? and an interesting article from | ||
| PowerShell logging | Enable (v3+) & command process logging | ||
| Block Office macros | (Windows & Mac) on content downloaded from the Internet | ||
| WEF | Deploy security tooling that monitors for suspicious behavior. Consider using to forward only interesting events to your SIEM or logging system | ||
Awesome Windows Domain Hardening / Initial foothold / Limit capability by blocking/restricting attachments via email/download: | |||
| these file types | Ensure are blocked | ||
| Excel file extensions | Block forgotten/unused : IQY, SLK | ||
Awesome Windows Domain Hardening / Initial foothold | |||
| Preventing activation of OLE packages | in Office with the PackagerPrompt registry setting | ||
Awesome Windows Domain Hardening / Reconnaissance | |||
| GPO | Increase security on sensitive s | ||
| (Microsoft ATA) | Evaluate deployment of behavior analytics | ||
| NetCease | Use to prevent unprivileged session enumeration | ||
| Samri10 | Use to prevent unprivileged local admin collection (this fix already exists in Windows 10 1607 and above) | ||
Awesome Windows Domain Hardening / Lateral Movement | |||
| (KB2871997) | Configure GPO to prevent local accounts from network authentication . In addition to this KB, is recommending two other changes in the registry: | ||
| (Microsoft LAPS) | Ensure local administrator account passwords are automatically changed & remove extra local admin accounts | ||
| (Windows Firewall) | Limit workstation to workstation communication | ||
Awesome Windows Domain Hardening / Privilege Escalation | |||
| (including GPP) | Remove files with passwords in SYSVOL | ||
| PAWs | Provide Privileged Access Workstations or for all highly privileged work. Those should never have access to the Internet | ||
| (FGPP) | Use Managed Service Accounts for SAs when possible | ||
| Fine-Grained Password Policy | For systems that do not support Managed Service Accounts, deploy a to ensure the passwords are >32 characters | ||
| LM/NTLMv1 | Ensure all computers are talking NTLMv2 & Kerberos, deny | ||
Awesome Windows Domain Hardening / Protect Administration Credentials | |||
| Protected Users group | Add all admin accounts to (requires Windows 2012 R2 DCs) | ||
Awesome Windows Domain Hardening / Protect Administration Credentials / Admin workstations & servers: | |||
| LLMNR | Disable | ||
| WPAD | Disable | ||
Awesome Windows Domain Hardening / Strengthen/Remove Legacy | |||
| LDAP signing | Enforce | ||
| SMB signing | Enable (& encryption where poss.) | ||
| shims | Use to enable old applications that require admin privileges to work by believing they have them | ||
Awesome Windows Domain Hardening / Tools | |||
| PingCastle | an Active Directory audit tool (and free!) with pretty good metrics | ||
| Responder | 5,534 | about 1 year ago | A LLMNR, NBT-NS and MDNS poisoner |
| BloodHound | 9,972 | over 1 year ago | Six Degrees of Domain Admin |
| AD Control Path | 656 | almost 5 years ago | Active Directory Control Paths auditing and graphing tools |
| PowerSploit | 11,979 | about 5 years ago | A PowerShell Post-Exploitation Framework |
| PowerView | 11,979 | about 5 years ago | Situational Awareness PowerShell framework |
| Empire | 7,480 | almost 6 years ago | PowerShell and Python post-exploitation agent |
| Mimikatz | 19,580 | over 1 year ago | Utility to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory but also perform pass-the-hash, pass-the-ticket or build Golden tickets |
| Tools Cheatsheets | 1,044 | about 8 years ago | (Beacon, PowerView, PowerUp, Empire, ...) |
| UACME | 6,448 | over 1 year ago | Defeating Windows User Account Control |
| Windows System Internals | (Including Sysmon etc.) | ||
| Hardentools | 2,935 | over 1 year ago | Collection of simple utilities designed to disable a number of "features" exposed by Windows |
| CrackMapExec | 8,501 | almost 2 years ago | A swiss army knife for pentesting Windows/Active Directory environments |
| SharpSploit | 1,753 | about 4 years ago | |
| Rubeus | 4,199 | about 1 year ago | Rubeus is a C# toolset for raw Kerberos interaction and abuses |
| Koadic | Koadic, or COM Command & Control, is a Windows post-exploitation rootkit | ||
| SILENTTRINITY | 2,204 | almost 2 years ago | A post-exploitation agent powered by Python, IronPython, C#/.NET |
Awesome Windows Domain Hardening / Videos | |||
| Beyond the Mcse: Active Directory for the Security Professional | |||
| BSides DC 2016 - PowerShell Security: Defending the Enterprise from the Latest Attack Platform | |||
| Six Degrees of Domain Admin... - Andy Robbins, Will Schroeder, Rohan Vazarkar | |||
| 111 Attacking EvilCorp Anatomy of a Corporate Hack | |||
| Red vs Blue: Modern Active Directory Attacks & Defense | |||
| Offensive Active Directory with Powershell | |||
| Advanced Incident Detection and Threat Hunting using Sysmon and Splunk | |||
| Real Solutions From Real Incidents: Save Money and Your Job! | |||
| AppLocker Bypass Techniques | |||
Awesome Windows Domain Hardening / Slides | |||
| From Workstation To Domain Admin - Why Secure Administration Isn't Secure | |||
| Exploiting AD Administrator Insecurities | |||
| How to go from Responding to Hunting with Sysinternals Sysmon | |||
| 111 Attacking EvilCorp Anatomy of a Corporate Hack | |||
| Real Solutions From Real Incidents: Save Money and Your Job! | |||
Awesome Windows Domain Hardening / Additional resources | |||
| ADSecurity | |||
| Harmj0y's blog | |||
| Sysmon SecuriTay's configuration file | 4,828 | over 1 year ago | template with default high-quality event tracing |
| Explaining and adapting Tay’s Sysmon configuration | and | ||
| Use of PSExec | |||
| Preventing Mimikatz attacks | |||
| Useful list of Windows Security Log Events | |||
| Introducing SharpSploit: A C# Post-Exploitation Library | |||
| From Kekeo to Rubeus | |||
| Windows oneliners to download remote payload and execute arbitrary code | |||
| Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. | 1,557 | almost 3 years ago | |
More related projects:
-
hausec/adape-script
-
emilyanncr/windows-post-exploitation
-
nextronsystems/aptsimulator
-
antoniococo/sharpyshell
-
bluscreenofjeff/red-team-infrastructure-wiki
-
bats3c/shad0w
-
donnemartin/haxor-news
-
govolution/avet
-
s1ckb0y1337/active-directory-exploitation-cheat-sheet
-
alessandroz/lazagne
-
donnemartin/saws
-
donnemartin/gitsome
-
netspi/esc
-
kkawakam/rustyline