Skip to main content

Hersteller-News

Detecting OS Credential Dumping done via WDigest – Security Spotlight

03. Januar 2024
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks.

In this Security Spotlight, we’ll be talking about OS Credential Dumping done via WDigest and how to detect it within LogRhythm SIEM and LogRhythm Axon (MITRE ATT&CK® Technique T1003.001).

 
What is WDigest?

WDigest is a protocol used for HTTP Digest Authentication and Simple Authentication Security Layer (SASL) exchanges. SASL functions as a framework for authentication in Internet protocols, designed specifically to decouple authentication protocols from applications. This separation grants applications the flexibility to employ any authentication method supported by SASL, allowing for a variety of authentication methods to be used.

Upon a user’s login, WDigest generates a Digest Access Authentication. This process circumvents sending a password in plaintext over the network by utilizing a hash function that generates a unique “digest”. This digest is then used to authenticate the user without exposing the password. However, for WDigest to construct this digest, it needs to retain a copy of the plaintext password in memory. This is where the potential for its misuse comes into play.

Why You Need to Look Out for Credential Dumping Done via WDigest

Cyber attackers are always seeking ways in which they can gain unauthorized entry into systems and networks. One technique that allows them to do just that is credential dumping. This technique involves extracting user credentials from a system’s memory. WDigest, owing to its design, inadvertently facilitates this due to it storing plaintext passwords in its memory.

By using tools like Mimikatz, attackers can dump these credentials and use them to escalate their privileges or move laterally within a network. Moreover, they can maintain persistence by reusing valid credentials to access resources, even after all initial malware or backdoors have been removed...Read More!