Users in Windows environments may be able to access domains other than those for which they are authenticated due to a security flaw in Microsoft’s Active Directory (AD) service that IT administrators may not be aware of.
The majority of Windows domain-type networks come pre-configured with AD, Microsoft’s all-purpose identity management tool for authenticating computers, printers, users, and virtually anything else taking part in an IT environment. According to Frost & Sullivan, tens of thousands of businesses use the service, including 90% of the Global Fortune 1000 corporations.
By using AD to manage authentication across a domain, network administrators may ensure that only authorised users can access the resources that have been assigned to them.
Nevertheless, Charlie Clark, a security researcher at Semperis, described how a user might circumvent AD’s security measures and access domains for which they were not specifically given permission in a study released on March 14. He says that by doing so, an attacker’s “attack surface” is greatly enlarged. Obviously, the larger the attack surface, the more like
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: