Cached Domain Credentials
https://attack.mitre.org/techniques/T1003/005/
Last updated
https://attack.mitre.org/techniques/T1003/005/
Last updated
ATT&CK ID: T1003.005
Permissions Required: SYSTEM
Description
Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain controller is unavailable.
On Windows Vista and newer, the hash format is DCC2 (Domain Cached Credentials version 2) hash, also known as MS-Cache v2 hash. The number of default cached credentials varies and can be altered per system. This hash does not allow pass-the-hash style attacks, and instead requires Password Cracking to recover the plaintext password.
Note: MS-Cache password hashes cannot be used in Pass-The-Hash (Pth) attacks. However, they can be cracked to reveal the clear-text password.
The "Local Administrator Password Solution" (LAPS) provides management of local account passwords of domain joined computers. Passwords are stored in Active Directory (AD) and protected by ACL, so only eligible users can read it or request its reset.
Policy Description
Each unique user's logon information is cached locally so that, in the event that a domain controller is unavailable during subsequent logon attempts, they are able to log on. The cached logon information is stored from the previous logon session.
Policy name
Interactive logon: Number of previous logons to cache (in case domain controller is not available)
Location
Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options
Value
5
(Recommended by CIS Controls)
This group was developed to provide better protection for high privileged accounts from credential theft attacks. Members of this group have non-configurable protection applied.