Last month, Microsoft has introduced a new feature of Azure AD Connect called Single Sign On. It allows companies to configure SSO between AD and AAD without the need to deploy ADFS, which makes it an ideal solution for SMEs. Here is a high-level diagram of this functionality:

Azure AD Connect SSO Diagram

As we can see from the diagram above, Azure AD exposes a publicly available endpoint that accepts Kerberos tickets and translates them into SAML and JWT tokens, which are understood and trusted by other cloud services like Office 365, Azure or Salesforce. And wherever you have Kerberos-based authentication, it can be attacked using Silver Tickets.

In usual circumstances this attack can only be performed from the intranet. But what really caught my attention is the fact that with this new SSO feature, Silver Tickets could be used from the entire internet. Let’s give it a try then!

The Nasty Stuff

To test this technique, we need to retrieve some information from Active Directory first:

  1. NTLM password hash of the AZUREADSSOACC$ account, e.g. f9969e088b2c13d93833d0ce436c76dd. This value can be retrieved from AD using mimikatz:

     mimikatz.exe "lsadump::dcsync /user:AZUREADSSOACC$" exit
    

    My own DSInternals PowerShell Module could do the same job:

     Get-ADReplAccount -SamAccountName 'AZUREADSSOACC$' -Domain contoso `
     -Server lon-dc1.contoso.local
    

    Both of these commands need Domain Admins permissions.

  2. Name of the AD domain, e.g. contoso.local.
  3. AAD logon name of the user we want to impersonate, e.g. elrond@contoso.com. This is typically either his userPrincipalName or mail attribute from the on-prem AD.
  4. SID of the user we want to impersonate, e.g. S-1-5-21-2121516926-2695913149-3163778339-1234.

Having this information we can now create and use the Silver Ticket on any Windows computer connected to the internet. It does not even matter whether it is joined to a domain or a workgroup:

  1. Create the Silver Ticket and inject it into Kerberos cache:

     mimikatz.exe "kerberos::golden /user:elrond /sid:S-1-5-21-2121516926-2695913149-3163778339 /id:1234 /domain:contoso.local /rc4:f9969e088b2c13d93833d0ce436c76dd /target:aadg.windows.net.nsatc.net /service:HTTP /ptt" exit
    

    Mimikatz Silver Ticket Screenshot

  2. Launch Mozilla Firefox.
  3. Go to about:config and set the network.negotiate-auth.trusted-uris preference to value “https://aadg.windows.net.nsatc.net,https://autologon.microsoftazuread-sso.com”.
  4. Navigate to any web application that is integrated with our AAD domain. We will use Office 365, which is the most commonly used one.
  5. Once at the logon screen, fill in the user name, while leaving the password field empty. Then press TAB or ENTER.

    Office 365 Sing-In Screen

  6. That’s it, we’re in!

    Office 365 Home

  7. To log in as another user, run the command below and repeat steps 1-6.

     klist purge
    

It is also worth noting that the password of the AZUREADSSOACC$ account never changes, so the stolen hash/key will work forever. It could therefore be misused by highly privileged employees to retain access to the IT environment after leaving the company. Dealing with such situations is a much broader problem, which is aptly depicted by the following old Narnian saying:

Once a Domain Admin, always a Domain Admin

Countermeasures

First of all, I have to point out that this technique would not be very practical in real-world situations due to these reasons:

  • The SSO feature is in Preview and has to be explicitly enabled by an AD admin. Just a handful of companies probably use it at the time of writing this article and enterprises will quite surely stick to their proven ADFS deployments even after this feature reaches GA.
  • The hash/key of the AZUREADSSOACC$ account can only be retrieved by Domain Admins from DCs by default. But if an attacker had such highly privileged access to an Active Directory domain, he/she would be able to do some way nastier stuff than just replicating a single hash.
  • The password of the AZUREADSSOACC$ account is randomly generated during the deployment of Azure AD Connect. It would therefore be impossible to guess this password.

As you can see, there is simply no need to panic. But just to be safe, I would recommend these generic security measures:

  • Only delegate administrative access to trusted individuals and keep the number of members of the Domain Admins group (and other privileged groups) as low as possible.
  • Protect backups of Domain Controllers, so no-one could extract sensitive information from them.
  • Enable and enforce Azure MFA for users authenticating from external IP addresses. It is very straightforward and effective against many kinds of attacks.
  • Consider implementing Azure AD conditional access.
  • Deploy Microsoft Defender for Identity to detect malicious replication and other threats to your AD infrastructure.
  • Force a password change on the AZUREADSSOACC$ account by re-deploying Azure AD Connect SSO running the Update-AzureSSOForest cmdlet after a highly privileged employee leaves the company and/or on a regular basis. This should be done together with resetting the password of krbtgt and other sensitive accounts.

Conclusion

Although the Silver Ticket attack has been here for some years, it is now probably the first time it can be used over the internet against a cloud service, which theoretically makes it even more potent. On the other hand, it would be quite hard to  perform this technique in a real-world environment due to impracticalities discussed in the previous section, so there is no need to worry. The new Seamless SSO feature of Azure AD Connect can therefore be considered safe and preferred solution for SSO to Office 365.