CAPEC-561: Windows Admin Shares with Stolen Credentials
Description
Extended Description
Windows systems within the Windows NT family contain hidden network shares that are only accessible to system administrators. These shares allow administrators to remotely access all disk volumes on a network-connected system and further allow for files to be copied, written, and executed, along with other administrative actions. Example network shares include: C$, ADMIN$ and IPC$. If an adversary is able to obtain legitimate Windows credentials, the hidden shares can be accessed remotely, via server message block (SMB) or the Net utility, to transfer files and execute code. It is also possible for adversaries to utilize NTLM hashes to access administrator shares on systems with certain configuration and patch levels.
Severity :
Possibility :
Type :
Detailed
Relationships with other CAPECs
This table shows the other attack patterns and high level categories that are related to this attack pattern.
Prerequisites
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- The system/application is connected to the Windows domain.
- The target administrative share allows remote use of local admin credentials to log into domain systems.
- The adversary possesses a list of known Windows administrator credentials that exist on the target domain.
Skills required
This table shows the other attack patterns and high level categories that are related to this attack pattern.
- Low Once an adversary obtains a known Windows credential, leveraging it is trivial.
Taxonomy mappings
Mappings to ATT&CK, OWASP and other frameworks.
Resources required
A list of known Windows administrator credentials for the targeted domain.
Related CWE
A Related Weakness relationship associates a weakness with this attack pattern. Each association implies a weakness that must exist for a given attack to be successful.
CWE-262: Not Using Password Aging
CWE-263: Password Aging with Long Expiration
CWE-294: Authentication Bypass by Capture-replay
CWE-308: Use of Single-factor Authentication
CWE-309: Use of Password System for Primary Authentication
CWE-521: Weak Password Requirements
CWE-522: Insufficiently Protected Credentials
Visit http://capec.mitre.org/ for more details.