Network Discovery
Introduction
The Unified Kill Chain (UKC) model provides a structured approach to investigating Network Discovery activities, a crucial stage in an attack lifecycle where adversaries gather information about the network, Active Directory (AD), and connected systems. In this phase, attackers use built-in tools and third-party utilities to perform reconnaissance, map network topology, identify high-value targets, and uncover security gaps. By leveraging the UKC model, defenders can identify signs of unauthorised discovery activity, link them to specific tactics, techniques, and procedures (TTPs), and take appropriate steps to mitigate potential threats.
Attackers often rely on tools that are either built into Microsoft Windows or are easily accessible, making detection more challenging. Below are some commonly used tools and methods during the network discovery phase:
ADRecon: A PowerShell-based tool designed to extract detailed Active Directory information, such as users, groups, and trusts, for reconnaissance purposes.
BloodHound (or SharpHound): A tool that leverages Windows API functions and Lightweight Directory Access Protocol (LDAP) queries to analyse and visualise AD privilege escalation paths.
ADFind: A command-line tool used to query Active Directory for information on objects, attributes, and group memberships.
ADExplorer: A Sysinternals tool that provides advanced browsing and editing capabilities for Active Directory, enabling attackers to view and manipulate directory data.
CrackMapExec: A post-exploitation tool written in Python that automates various tasks, including network reconnaissance, credential validation, and privilege escalation.
PowerView: A PowerShell tool used to gain situational awareness of a Windows network by identifying shares, users, groups, and trust relationships.
LDAP Browser: A utility for browsing and analysing LDAP directories, often used to inspect AD data structures.
PowerShell Built-In Applets: Attackers use native PowerShell cmdlets, such as
Get-ADUser
orGet-NetIPAddress
, to extract network and AD data stealthily.Nltest: A command-line tool for querying domain controllers, trust relationships, and domain status.
Net.exe: A Windows command-line tool used to enumerate shared resources, domain groups, and user accounts.
The above utilities use Microsoft protocols implemented in Active Directory setups: LDAP and Simple Message Block (SMB) and their wrappers, including Microsoft remote procedure call (MS-RPC) operating via TCP/UDP ports 139 and 445 and network or locally named pipes \pipe<pipe_name>. In addition, they may involve Microsoft Remote Server Administration Tools (RSAT) if available and implement authentication protocols support via Kerberos, NTLM, Wdigest, and SSL/TLS.
These tools can be obfuscated or packed, executables can be renamed, or input parameter names can be changed to avoid detection. In cases where malware is used, a stager or payload can be used to invoke Recon-AD, a tool based on Active Directory Service Interface (ADSI), that operates via COM-objects to access the features of directory services from different network providers. These tools are usually delivered and executed in memory, which makes forensic analysis much more challenging and requires user-space monitoring such as Windows API functions hooks. Effective EDR/XDR solutions will detect these activities.
Once network discovery is done, an adversary captures information about the reachable subnets and matches hostnames to their IP addresses. This results in a clearer understanding of which ports are available from the current host. Additionally, they will search for unpatched systems using active and passive techniques. The next potential objective is for the attacker to maintain sufficient access and visibility across the environment.
Adversaries frequently use these tools during network discovery due to their availability and ability to blend into regular administrative activity. By focusing on these tools and their usage patterns, defenders can identify suspicious behaviour, such as excessive AD queries, abnormal use of PowerShell, or unauthorised execution of discovery tools. Using detection platforms like Microsoft Sentinel (KQL), Velociraptor (VQL), and Splunk (SPL), SOC analysts can systematically investigate network discovery activities and disrupt attackers early in the attack lifecycle.
Last updated