Submitted via IRC for TheMightyBuzzard
Microsoft researchers Itay Grady and Tal Be'ery have released Net Cease, a PowerShell script that prevents attackers who have already compromised an endpoint from getting information about other targets within the same corporate network.
The idea behind the script is to make attackers' lateral movement on the network more difficult.
[...] Net Cease works by changing the default permissions for the NetSessionEnum method to limit the number of domain users who are able to execute the method remotely.
"The NetCease script hardens the access to the NetSessionEnum method by removing the execute permission for Authenticated Users group and adding permissions for interactive, service and batch logon sessions," the creators explained.
This one's for all you admin types out there who have no choice but to have large numbers of Windows devices on your network.
Source: https://www.helpnetsecurity.com/2016/10/18/net-cease-network-anti-reconnaissance-tool/
(Score: 1, Funny) by Anonymous Coward on Wednesday October 19 2016, @06:05PM
Great, this particular attack vector used by exactly ONE guy over in Elbonia has now been disabled. This will not stop anything.
Also, "I wrote a script that does something" is now newsworthy?
(Score: 2, Informative) by Anonymous Coward on Wednesday October 19 2016, @06:08PM
And for those interested, below is the full script. It's pathetic that this is newsworthy in any shape, way or form.
This isn't a "OMG, Microsoft Research makes huge strides", instead it is more along the lines of "anyone, even an intern, could have written this" (and it was likely written by an intern).
(Score: 1, Redundant) by Nerdfest on Wednesday October 19 2016, @06:38PM
Isn't this just slapping some duct tape over bad design to begin with?
(Score: 2) by sjames on Wednesday October 19 2016, @07:53PM
Someone wrote a script that does something in the godawful gobbledygook that is powershell? That *IS* news!