All Projects → Qianlitp → WatchAD

Qianlitp / WatchAD

Licence: GPL-3.0 License
AD Security Intrusion Detection System

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to WatchAD

active-directory-integration2
WordPress plug-in "Next Active Directory Integration"
Stars: ✭ 51 (-94.73%)
Mutual labels:  active-directory, ntlm, kerberos
proxyplease
Cross-platform proxy selection with optional native authentication negotiation
Stars: ✭ 37 (-96.17%)
Mutual labels:  ntlm, kerberos
Logontracer
Investigate malicious Windows logon by visualizing and analyzing Windows event log
Stars: ✭ 1,914 (+97.93%)
Mutual labels:  active-directory, event-log
requests auth
Authentication classes to be used with requests
Stars: ✭ 28 (-97.1%)
Mutual labels:  active-directory, ntlm
OpenAM
OpenAM is an open access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements and Web Services Security.
Stars: ✭ 476 (-50.78%)
Mutual labels:  active-directory, kerberos
nsspi
A C# / .Net interface to the Win32 SSPI authentication API
Stars: ✭ 60 (-93.8%)
Mutual labels:  ntlm, kerberos
aspnet-core-ad-authentication
ASP.NET Core Active Directory authentication use LDAP
Stars: ✭ 21 (-97.83%)
Mutual labels:  active-directory
k8s-idm-lab
Kubernetes Identity Management Lab
Stars: ✭ 20 (-97.93%)
Mutual labels:  active-directory
gitlab-ldap-group-sync
Manage your gitlab groups with ldap / active directory
Stars: ✭ 21 (-97.83%)
Mutual labels:  active-directory
adsys
Active Directory bridging tool suite
Stars: ✭ 80 (-91.73%)
Mutual labels:  active-directory
Remote-Integrity-Tool
The DearBytes remote integrity tool is an IDS (Intrusion Detection System) that keeps track of files on a remote server and logs an event if a file gets added, removed or modified.
Stars: ✭ 12 (-98.76%)
Mutual labels:  intrusion-detection-system
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-97.83%)
Mutual labels:  intrusion-detection-system
py-hdfs-mount
Mount HDFS with fuse, works with kerberos!
Stars: ✭ 13 (-98.66%)
Mutual labels:  kerberos
Auth
Manage multiple user authentication databases from a central web application
Stars: ✭ 17 (-98.24%)
Mutual labels:  active-directory
VindicateTool
LLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-95.86%)
Mutual labels:  blue-team
mailad
Software to provision a mail server with users from a Windows or Samba 4 Active Directory
Stars: ✭ 21 (-97.83%)
Mutual labels:  active-directory
go-http-ntlm
NTLM authenticated http request for Go
Stars: ✭ 43 (-95.55%)
Mutual labels:  ntlm
pure-sasl
A pure python SASL client
Stars: ✭ 32 (-96.69%)
Mutual labels:  kerberos
NIDS-Intrusion-Detection
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-95.35%)
Mutual labels:  intrusion-detection-system
PSGPPreferences
A way to manage Group Policy Preferences through PowerShell
Stars: ✭ 15 (-98.45%)
Mutual labels:  active-directory

WatchAD

PyPI version ElasticSearch version Logstash version RabbitMQ version DEF CON 27 Blue Team Village

AD Security Intrusion Detection System

English Document | 中文文档

After Collecting event logs and kerberos traffic on all domain controllers, WatchAD can detect a variety of known or unknown threats through features matching, Kerberos protocol analysis, historical behaviors, sensitive operations, honeypot accounts and so on.The WatchAD rules cover the many common AD attacks.

The WatchAD has been running well on the Qihoo 360 intranet for more than six months and has found several threat activities.

In order to support the open-source community and promote the improvement of the project, we decided to open source part of the system that based on the event log detections.

The following are currently supported detections:

  • Discovery: Reconnaissance using Directory Services queries, Reconnaissance using PsLoggedOn, Honeypot accounts Activity.
  • Credential Dumping: Kerberoasting [NT], AS-REP Roasting, Remotely dump the password of DC.
  • Lateral Movement: Brute Force , Suspicious remotely logon using credentials, Remote execution targeting to DC、Abnormal windows file share name, Encryption downgrade activity [NT], Abnormal Kerberos ticket request [NT].
  • Privilege Escalation: Abnormal modification of ACL, Detection of MS17-010 attacks, Creation of new Group Policy, NTLM Relay Activity, Sensitive permission of resource-based constraint delegation granted, Attacking printer services with SpoolSample, Privilege escalation with MS14-068 Attacks [NT], Suspicious Kerberos Constraint Delegation activity [NT]
  • Persistence: Modification of AdminSDHolder, DCShadow Attack Detection, Modification of the DSRM password, Sensitive permission of Group Policy delegation granted, Sensitive permission of Kerberos constraint delegated granted, Modification of sensitive groups, Creation of new System Service on DC, Creation of new Scheduled Task on DC, Modification of SIDHistory, Skeleton Key active detection, Skeleton Key passive detection [NT], Kerberos Golden Ticket Activity [NT].
  • Defense Evasion: Malicous clearance of event logs, Event log service shut down

[NT] represent "based on Network traffic". Up to now, these part is not in this open-source plan. We will continue to open source based on the feedback.

Our talk "Evaded Microsoft ATA? But You Are Completely Exposed By Event Logs" about detecting AD attacks based on event log is shown at the DEF CON 27 @ Blue Team Village.

Installation

WatchAD is a completely detection system with lots of components. Please refer to the installation tutorial to install. To set up a honeypot account, please refer to the honeypot account tutorial

Architecture

Architecture

This project WatchAD only contains part of the code, which associated with the detection engine. In order to format the display you can put alarm data into your platform, or use the Web platform we developed -- WatchAD-Web, which is a simple platform tailored to WatchAD for some common operations. If you have more needs for interface design or operation experience, please customize the development according to WatchAD's alarm data.

Custom detection module

WatchAD supports the development of custom detection modules, please refer to our development tutorial

If you don't need some module,You can delete the module's .py file directly and restart the detection engine.

Do not delete files in the "record" directory, which is not involved in threat detections and just record for key activities of entities.

// TODO

  • English code comment
  • Compatible with ElasticSearch 6.X
  • Reduce false positives
  • Kerberoasting: the detection based on event log was replaced by kerberos traffic analysis. We are considering add it back.
  • Pass-the-Hash(PtH): There are some false positives, optimizing
  • Pass-the-Ticket(PtT): There are some false positives, optimizing
  • Silver-Ticket: There are some false positives, optimizing
  • Fake account information:There are some false positives, optimizing
  • Compromised account detection based on historical behaviors
  • Detections Based on Kerberos traffic open source
  • NTLM protocol traffic Analysis

If you find other attack methods that can be added to WatchAD detection, please submit a issue to let us know, or submit a PR to become a contributor to this project.

If you find that a detection module has many false positives (more than 10 per day), please submit a issue to tell us or submit a PR after fixing.

Follow me

Github: @9ian1i Twitter: @9ian1i

Reference

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].