Source: #_shellntel Blog Author: unknown URL: https://blog.shellntel.com/p/using-rpc-filters-to-protect-against-coercion-attacks
ONE SENTENCE SUMMARY:
Coercion attacks exploit network vulnerabilities to escalate privileges, requiring comprehensive remediation and detection strategies beyond simple patches or fixes.
MAIN POINTS:
- Coercion attacks force authentication requests to attacker-specified hosts, often chaining with other exploits.
- Many organizations fail to fully remediate coercion vulnerabilities despite widespread awareness.
- Partial remediation often focuses on ADCS or NTLMv1 downgrading, leaving other attack vectors open.
- RPC filters in Windows can mitigate some coercion attacks but have limitations and bypasses.
- Several well-known coercion vulnerabilities exist, including Printer Bug, PetitPotam, and DFS Coerce.
- Microsoft has patched some vulnerabilities, but others remain exploitable with authenticated access.
- PowerShell scripts can help automate blocking vulnerable RPC endpoints.
- Event IDs like 5145 and 5712 can aid in detecting coercion attack attempts.
- Domain Controllers should not run print spooler services to reduce attack surfaces.
- Effective remediation requires patching, disabling unnecessary services, and implementing robust monitoring.
TAKEAWAYS:
- Coercion attacks remain a serious privilege escalation threat despite existing mitigations.
- Organizations must implement layered defenses, not just rely on patching.
- PowerShell scripts can streamline RPC endpoint blocking for better security.
- Monitoring Event IDs like 5145 can improve detection of attack attempts.
- Regular security assessments are essential to identify and remediate lingering vulnerabilities.