unassassinable / Paw

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Paw

Minimalistic Offensive Security Tools
A repository of tools for pentesting of restricted and isolated environments.
Stars: ✭ 135 (-44.44%)
Mutual labels:  active-directory
Cypheroth
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
Stars: ✭ 179 (-26.34%)
Mutual labels:  active-directory
Adaz
🔧 Automatically deploy customizable Active Directory labs in Azure
Stars: ✭ 197 (-18.93%)
Mutual labels:  active-directory
Logontracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Stars: ✭ 1,914 (+687.65%)
Mutual labels:  active-directory
Adsips
PowerShell module to interact with Active Directory using ADSI and the System.DirectoryServices namespace (.NET Framework)
Stars: ✭ 160 (-34.16%)
Mutual labels:  active-directory
Ldaptools
LdapTools is a feature-rich LDAP library for PHP 5.6+.
Stars: ✭ 185 (-23.87%)
Mutual labels:  active-directory
Actionpacks
Public PowerShell script gallery for ScriptRunner.
Stars: ✭ 118 (-51.44%)
Mutual labels:  active-directory
Ad Ldap Enum
An LDAP based Active Directory user and group enumeration tool
Stars: ✭ 223 (-8.23%)
Mutual labels:  active-directory
Multiotp
multiOTP open source strong two factor authentication PHP library, OATH certified, with TOTP, HOTP, Mobile-OTP, YubiKey, SMS, QRcode provisioning, etc.
Stars: ✭ 173 (-28.81%)
Mutual labels:  active-directory
Awesome Windows Security
List of Awesome Windows Security Resources
Stars: ✭ 196 (-19.34%)
Mutual labels:  active-directory
Ldap Passwd Webui
Very simple web interface for changing password stored in LDAP or Active Directory (Samba 4 AD).
Stars: ✭ 150 (-38.27%)
Mutual labels:  active-directory
Adessentials
PowerShell Active Directory helper functions to manage healthy Active Directory
Stars: ✭ 153 (-37.04%)
Mutual labels:  active-directory
Monitor Adgroupmembership
PowerShell script to monitor Active Directory groups and send an email when someone is changing the membership
Stars: ✭ 190 (-21.81%)
Mutual labels:  active-directory
Adsearch
A tool to help query AD via the LDAP protocol
Stars: ✭ 137 (-43.62%)
Mutual labels:  active-directory
Powershell Scripts
PowerShell scripts ranging from SCCM, MSO, AD, and other corporate enterprise uses... to sending cat facts to coworkers.
Stars: ✭ 201 (-17.28%)
Mutual labels:  active-directory
Bonobo Git Server
Bonobo Git Server for Windows is a web application you can install on your IIS and easily manage and connect to your git repositories. Go to homepage for release and more info.
Stars: ✭ 1,693 (+596.71%)
Mutual labels:  active-directory
Macoslaps
Swift binary that will change a local administrator password to a random generated password. Similar behavior to LAPS for Windows
Stars: ✭ 182 (-25.1%)
Mutual labels:  active-directory
Zbang
zBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (-7.82%)
Mutual labels:  active-directory
Ad Password Protection
Active Directory password filter featuring breached password checking and custom complexity rules
Stars: ✭ 210 (-13.58%)
Mutual labels:  active-directory
Ldapcherry
Web UI for managing users and groups in multiple directory services.
Stars: ✭ 194 (-20.16%)
Mutual labels:  active-directory

How do I use this repo?

I have listed each security control in a recommended order that should be followed when starting out. Each directory is labeled ## - Title. Each directory contains its own README file that details what's going on and how to apply the control. Follow the order of the numbers. When done, work on the xx - policy controls in any order you desire.

To alleviate troubleshooting, fully test your environment before continuing on to the next section. Literally spend several days living under the new policy to see how things work.

Where a script is concerned, specific instruction and requirements to run the script can be found within the script's comment header.

Privileged Access Workstation (PAW)

What is a PAW?

In short, a PAW is one solution to the problem of credential theft, replay and pivoting attacks, and privilege escalation. PAW is a method of administrating network devices in a more secure and more hardened environment than what most admins are used to. A successful PAW deployment will contain many security controls aimed to enable a more Defense in Depth security strategy.

Okay, but what is a PAW?

A PAW is the workstation the admin uses to access and administrate the network using privileged credentials. It provides the admin a secure method to perform day-to-day administrative tasks on network devices such as Domain Controllers, member servers, user workstations, networking equipment, and cloud admin portals (like Azure and AWS). Because the PAW adheres to the Clean Source Security Principal it prevents the logged on user from freely surfing the Internet, checking email, running applications outside of the AppLocker whitelist, or insecurely accessing network devices that could expose risk to credential theft. It provides the admin everything they need to do their job and nothing more Least Privilege Security.

How is a PAW physically different than a normal workstation where I administrate my servers with RDP and MMC?

The PAW is a physical workstation, preferably a laptop, that runs Windows 10 Enterprise Edition (1709+) as the primary host OS. This device is used to administrate the network and all the systems on it. It has the Hyper-V role installed that, in addition to security features like Credential Guard, hosts a VM that provides the admin day-to-day Internet access and email. PAWs have several hardware requirements to make for the most secure deployment:

  • Windows 10 compatible (no Chrome books or Mac)
  • TPM 2.0
  • Enough hard drive, CPU, and RAM resources to have a pleasant experience in your day-to-day VM

Consider buying from a vendor that has frequent firmware updates and a long support life-cycle. Specialized hardware like Sony Vaio and Alienware should also not be considered.

Additionally, you should be aware of DMA attacks and consider purchasing hardware that does not come with DMA ports (Thunderbolt, PCI-E, Firewire, ExpressCard). See Sami Laiho's Win-Fu Blog for more details about DMA attacks and mitigation.

If a single workstation that handles the load of two is not optimal for your environment, you can split the roles onto separate laptops. One workstation for secure administration, and one for Internet and email.

Is it difficult to configure PAWs?

The main purpose of this repo is provide baseline configuration templates and walkthroughs to make the configuration simpler. Initially, it is quite complex. As I look at my GPOs that are designed to address only PAWs, I count 36 and growing. The biggest complexity, however, is changing your IT team's behavior around remote administration. You will be doing things very different than you are used to. I like the saying, it is fundamentally impossible to improve something wilst keeping it the same.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].