Submitted via IRC for TheMightyBuzzard
Microsoft researchers Itay Grady and Tal Be'ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from getting information about other targets within the same corporate network.
The idea behind the script is to make attackers' lateral movement on the network more difficult.
[...] Net Cease works by changing the default permissions for the NetSessionEnum method to limit the number of domain users who are able to execute the method remotely.
"The NetCease script hardens the access to the NetSessionEnum method by removing the execute permission for Authenticated Users group and adding permissions for interactive, service and batch logon sessions," the creators explained.
This one's for all you admin types out there who have no choice but to have large numbers of Windows devices on your network.
Source: https://www.helpnetsecurity.com/2016/10/18/net-cease-network-anti-reconnaissance-tool/
(Score: 1, Funny) by Anonymous Coward on Wednesday October 19 2016, @06:05PM
Great, this particular attack vector used by exactly ONE guy over in Elbonia has now been disabled. This will not stop anything.
Also, "I wrote a script that does something" is now newsworthy?
(Score: 2, Informative) by Anonymous Coward on Wednesday October 19 2016, @06:08PM
And for those interested, below is the full script. It's pathetic that this is newsworthy in any shape, way or form.
This isn't a "OMG, Microsoft Research makes huge strides", instead it is more along the lines of "anyone, even an intern, could have written this" (and it was likely written by an intern).
(Score: 1, Redundant) by Nerdfest on Wednesday October 19 2016, @06:38PM
Isn't this just slapping some duct tape over bad design to begin with?
(Score: 2) by sjames on Wednesday October 19 2016, @07:53PM
Someone wrote a script that does something in the godawful gobbledygook that is powershell? That *IS* news!
(Score: 1, Insightful) by Anonymous Coward on Wednesday October 19 2016, @06:21PM
This is the saddest bit of security PR ever, and will probably give them a boost in confidence by most...
(Score: 1, Redundant) by canopic jug on Wednesday October 19 2016, @06:54PM
Money is not free speech. Elections should not be auctions.
(Score: 2) by canopic jug on Thursday October 20 2016, @12:19PM
Look it up in the SEC filing rather. It's there in black and white in the Form 10-Q for the Quarter Ended March 31, 2002 [sec.gov] and earlier. Before M$ became a lobbying engine, it was first and foremost a marketing company. Eons before that, it did an abortive attempt at operating systems, but survived having inherited IBM's monopoly. Before that it did software, but that was eons ago and all that is long ago in the past now. What it is today is unclear, it has gone beyond marketing and lobbying and has several cult-like characteristics.
This "Research" is just marketing money thrown at selected, bumbling grad students or desperate post-docs, in exchange for M$ using their efforts as PR.
Money is not free speech. Elections should not be auctions.
(Score: 4, Funny) by aristarchus on Wednesday October 19 2016, @07:00PM
Actually, this is probably meant to take attention off the Wikileak of Clinton's emails, wherein Bill OR Melinda Gates were suggested for the VP slot on the Clinton ticket.
(Score: 3, Insightful) by frojack on Wednesday October 19 2016, @07:31PM
Well I don't actually see an election tie in, and if there was something to suppress it would be the Lolita Express [washingtontimes.com] story, rather than VP choices that were never real, and never going to fly in the first place.
The fact that a beachhead in any single windows domain member usually gives you total lateral access across multiple domains, isn't news.
And the idea that some cheasy script is going to stop that seems laughable.
I can't imagine why Microsoft would release this as an optional script rather than a real patch, unless of course it cripples much of the windows domain functionality that users have come to expect and rely on (knowing full well it was insecure).
No, you are mistaken. I've always had this sig.
(Score: 1, Interesting) by Anonymous Coward on Wednesday October 19 2016, @06:57PM
First the bad story about Bellicheck hating their tablet shows up . Two puff pieces immediately follow. Coincidence or Astroturfing?
(Score: 3, Insightful) by edIII on Wednesday October 19 2016, @07:16PM
So Microsoft [security] researchers were working on Anti-Reconnaissance tools? Does their telemetry department know they declared war on them? :)
Microsoft and Anti-Reconnaissance are mutually exclusive.
Technically, lunchtime is at any moment. It's just a wave function.
(Score: 2) by RamiK on Wednesday October 19 2016, @09:14PM
Got pwned? Have no fear! Microsoft's rapid response anti-virus team composed of the finest power-shell script kiddies H1Bs could buy will seal that leak in no time!
compiling...