All Projects → utsecnet → PAW

utsecnet / PAW

Licence: other
No description or website provided.

Programming Languages

powershell
5483 projects
javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to PAW

adsys
Active Directory bridging tool suite
Stars: ✭ 80 (-71.12%)
Mutual labels:  active-directory, group-policy
PSGPPreferences
A way to manage Group Policy Preferences through PowerShell
Stars: ✭ 15 (-94.58%)
Mutual labels:  active-directory, group-policy
gpp-decrypt
Tool to parse the Group Policy Preferences XML file which extracts the username and decrypts the cpassword attribute.
Stars: ✭ 13 (-95.31%)
Mutual labels:  active-directory, group-policy
Adtimeline
Timeline of Active Directory changes with replication metadata
Stars: ✭ 252 (-9.03%)
Mutual labels:  active-directory
ActiveDirectoryEnumeration
Enumerate AD through LDAP with a collection of helpfull scripts being bundled
Stars: ✭ 127 (-54.15%)
Mutual labels:  active-directory
ActiveDirectoryCSDsc
DSC resources for installing or uninstalling Active Directory Certificate Services components in Windows Server.
Stars: ✭ 45 (-83.75%)
Mutual labels:  active-directory
django-windowsauth
Easy integration and deployment of Django projects into Windows Environments
Stars: ✭ 23 (-91.7%)
Mutual labels:  active-directory
Paw
Stars: ✭ 243 (-12.27%)
Mutual labels:  active-directory
shareAttack
Automatically attack all file shares within AD network environment. Exploiting weak permissions.
Stars: ✭ 17 (-93.86%)
Mutual labels:  active-directory
go-adal
unofficial Active Directory Authentication Library for go
Stars: ✭ 14 (-94.95%)
Mutual labels:  active-directory
FindUncommonShares
FindUncommonShares.py is a Python equivalent of PowerView's Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows Domains.
Stars: ✭ 186 (-32.85%)
Mutual labels:  active-directory
requests auth
Authentication classes to be used with requests
Stars: ✭ 28 (-89.89%)
Mutual labels:  active-directory
Some Pentesters SecurityResearchers RedTeamers
Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...
Stars: ✭ 60 (-78.34%)
Mutual labels:  defensive-security
crimson-spray
A lockout aware password sprayer
Stars: ✭ 11 (-96.03%)
Mutual labels:  active-directory
samba4-l1
🔴 Curso GRÁTIS SAMBA 4 Level 1 REPOSITÓRIO CONGELADO - Esse repositório não irá mais receber atualizações.
Stars: ✭ 60 (-78.34%)
Mutual labels:  active-directory
Testimo
Testimo is PowerShell module for running health checks for Active Directory (and later on any other server type) against a bunch of different tests
Stars: ✭ 249 (-10.11%)
Mutual labels:  active-directory
DEFCON25 Attack Defend ActiveDirectory Workshop
Workshop Materials from DEFCON 25 (7/27/2017)
Stars: ✭ 19 (-93.14%)
Mutual labels:  active-directory
passport-activedirectory
Active Directory strategy for passport.js
Stars: ✭ 28 (-89.89%)
Mutual labels:  active-directory
active-directory-lookup
Simplest Java API (and CLI) for authenticating and searching in Active Directory
Stars: ✭ 15 (-94.58%)
Mutual labels:  active-directory
ansible-role-system ldap
Configures SSSD to authenticate against AD's LDAP endpoints
Stars: ✭ 31 (-88.81%)
Mutual labels:  active-directory

How do I use this repo?

I have listed each security control in a recommended order that should be followed when starting out. Each directory is labeled ## - Title. Each directory contains its own README file that details what's going on and how to apply the control. Follow the order of the numbers. When done, work on the xx - policy controls in any order you desire.

To alleviate troubleshooting, fully test your environment before continuing on to the next section. Literally spend several days living under the new policy to see how things work.

Where a script is concerned, specific instruction and requirements to run the script can be found within the script's comment header.

Privileged Access Workstation (PAW)

What is a PAW?

In short, a PAW is one solution to the problem of credential theft, replay and pivoting attacks, and privilege escalation. PAW is a method of administrating network devices in a more secure and more hardened environment than what most admins are used to. A successful PAW deployment will contain many security controls aimed to enable a more Defense in Depth security strategy.

Okay, but what is a PAW?

A PAW is the workstation the admin uses to access and administrate the network using privileged credentials. It provides the admin a secure method to perform day-to-day administrative tasks on network devices such as Domain Controllers, member servers, user workstations, networking equipment, and cloud admin portals (like Azure and AWS). Because the PAW adheres to the Clean Source Security Principal it prevents the logged on user from freely surfing the Internet, checking email, running applications outside of the AppLocker whitelist, or insecurely accessing network devices that could expose risk to credential theft. It provides the admin everything they need to do their job and nothing more Least Privilege Security.

How is a PAW physically different than a normal workstation where I administrate my servers with RDP and MMC?

The PAW is a physical workstation, preferably a laptop, that runs Windows 10 Enterprise Edition (1709+) as the primary host OS. This device is used to administrate the network and all the systems on it. It has the Hyper-V role installed that, in addition to security features like Credential Guard, hosts a VM that provides the admin day-to-day Internet access and email. PAWs have several hardware requirements to make for the most secure deployment:

  • Windows 10 compatible (no Chrome books or Mac)
  • TPM 2.0
  • Enough hard drive, CPU, and RAM resources to have a pleasant experience in your day-to-day VM

Consider buying from a vendor that has frequent firmware updates and a long support life-cycle. Specialized hardware like Sony Vaio and Alienware should also not be considered.

Additionally, you should be aware of DMA attacks and consider purchasing hardware that does not come with DMA ports (Thunderbolt, PCI-E, Firewire, ExpressCard). See Sami Laiho's Win-Fu Blog for more details about DMA attacks and mitigation.

If a single workstation that handles the load of two is not optimal for your environment, you can split the roles onto separate laptops. One workstation for secure administration, and one for Internet and email.

Is it difficult to configure PAWs?

The main purpose of this repo is provide baseline configuration templates and walkthroughs to make the configuration simpler. Initially, it is quite complex. As I look at my GPOs that are designed to address only PAWs, I count 36 and growing. The biggest complexity, however, is changing your IT team's behavior around remote administration. You will be doing things very different than you are used to. I like the saying, it is fundamentally impossible to improve something wilst keeping it the same.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].