<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Webdav — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/webdav/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/webdav/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Local NTLM Relay via HTTP</title><link>https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-http/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-http/</guid><description>Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.</description><content:encoded><![CDATA[<p>This detection identifies attempts to coerce local NTLM authentication over HTTP through WebDAV named-pipe paths, focusing on Print Spooler and SRVSVC. Attackers can exploit this vulnerability, often combined with tools like NTLMRelay2Self, PetitPotam, or modified versions of krbrelayx&rsquo;s printerbug.py, to relay the obtained credentials and escalate their privileges within the network. This technique allows attackers to bypass traditional security measures by leveraging legitimate Windows protocols for malicious purposes. Successful exploitation can lead to domain dominance and unauthorized access to sensitive resources. This activity is often associated with post-exploitation activity following initial access via other means.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>rundll32.exe</code> to load <code>davclnt.dll</code> using the <code>DavSetCookie</code> function.</li>
<li>The <code>rundll32.exe</code> process is invoked with arguments specifying a named pipe path over HTTP, such as <code>http*/print/pipe/*</code>, <code>http*/pipe/spoolss</code>, or <code>http*/pipe/srvsvc</code>.</li>
<li>The system attempts to authenticate to the specified HTTP endpoint using NTLM.</li>
<li>The attacker intercepts the NTLM authentication request.</li>
<li>Using a relay tool like NTLMRelay2Self or ntlmrelayx, the attacker relays the captured NTLM credentials to another service or machine.</li>
<li>The attacker leverages the relayed credentials to escalate privileges or gain unauthorized access to network resources.</li>
<li>The attacker may then perform lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to escalate privileges within the compromised system and potentially the entire domain. This can lead to unauthorized access to sensitive data, deployment of ransomware, or other destructive activities. The impact ranges from data breaches and financial losses to complete system compromise. Depending on the targeted accounts, the attacker may be able to achieve domain administrator privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Local NTLM Relay via HTTP&rdquo; to your SIEM to detect the execution of <code>rundll32.exe</code> with specific arguments indicative of NTLM relay attempts.</li>
<li>Enable Sysmon process creation logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Monitor network connections originating from processes that load <code>davclnt.dll</code> to identify potential NTLM relay traffic.</li>
<li>Investigate and block the usage of tools like NTLMRelay2Self, PetitPotam, and ntlmrelayx within the environment.</li>
<li>Implement mitigations for NTLM relay attacks, such as enabling Extended Protection for Authentication (EPA) and disabling NTLM where possible.</li>
<li>Review and restrict the usage of WebClient service and Print Spooler service where not required.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ntlm-relay</category><category>credential-access</category><category>windows</category><category>webdav</category></item><item><title>Rare Connection to WebDAV Target via Rundll32</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-webdav/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-webdav/</guid><description>This rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.</description><content:encoded><![CDATA[<p>Attackers can exploit WebDAV by injecting WebDAV paths into files or features opened by a victim user, leading to NTLM credential leakage through forced authentication. This technique relies on the victim&rsquo;s system attempting to authenticate against a malicious WebDAV server when accessing a file or link containing a WebDAV path. This threat is particularly relevant for defenders because it can lead to unauthorized access to sensitive information and potential lateral movement within the network. The attack leverages <code>rundll32.exe</code> to initiate the WebDAV connection, making it difficult to distinguish from legitimate system processes. The Elastic detection rule identifies rare WebDAV connection attempts to uncover potential credential access attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious document or link containing a WebDAV path.</li>
<li>The victim user opens the malicious document or clicks the link.</li>
<li>The operating system attempts to resolve the WebDAV path using <code>rundll32.exe</code> and the <code>DavSetCookie</code> function.</li>
<li>The system initiates an authentication attempt with the malicious WebDAV server.</li>
<li>The attacker captures the NTLM credentials during the authentication handshake.</li>
<li>The attacker relays the captured NTLM credentials to access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to credential compromise and potential lateral movement within the victim&rsquo;s network. An attacker could gain unauthorized access to sensitive data and systems, potentially leading to data exfiltration, system compromise, or further attacks. This can impact organizations of any size and industry that rely on NTLM authentication. The severity depends on the user&rsquo;s permissions and the resources they can access with their compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect suspicious WebDAV connections initiated via <code>rundll32.exe</code>.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on rare or unusual WebDAV destinations.</li>
<li>Monitor process creation events for <code>rundll32.exe</code> with command-line arguments containing &ldquo;DavSetCookie&rdquo;, focusing on connections to external domains.</li>
<li>Conduct regular security awareness training to educate users about the risks of opening unsolicited documents or clicking suspicious links.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>webdav</category><category>windows</category></item></channel></rss>