<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Emulation of attack techniques to improve the security posture of an infrastructure managed by Active Directory</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Armelle Sanya</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Max Fréjus O. Sanya</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emery ASSOGBA</string-name>
          <email>assogba.emery@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tahirou DJARA</string-name>
          <email>csmdjara@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Active Directory, MITRE ATT&amp;CK, Mimikatz, Attack techniques</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ecole Polytechnique d'Abomey-Calavi (EPAC), University of Abomey-Calavi</institution>
          ,
          <addr-line>Abomey-Calavi</addr-line>
          ,
          <country country="BJ">Benin</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institut de Formation et de Recherche en Informatique (IFRI), University of Abomey-Calavi</institution>
          ,
          <addr-line>Abomey-Calavi</addr-line>
          ,
          <country country="BJ">Benin</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <fpage>27</fpage>
      <lpage>28</lpage>
      <abstract>
        <p>Companies and public and private organizations face increasing cyber threats. To combat these threats, they need an efective defense methodology that considers the techniques used by potential attackers. This work involved using the MITRE ATT&amp;CK knowledge base's attack techniques against an infrastructure managed by Active Directory in a contained environment. Three defense profiles based on the state of the art were proposed, and techniques to circumvent them were implemented. Appropriate recommendations for companies and organizations were provided.</p>
      </abstract>
      <kwd-group>
        <kwd>Directory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Computer infrastructures are interconnected systems
used to store, process, and transmit sensitive
information [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. With the increase in the volume of data
processed and stored, these computer infrastructures have
gained significant importance, especially with the
integration of emerging technologies such as Cloud
computing, the Internet of Things (IoT), and social networks.
These integrations also unfortunately bring a
weakening influence on the security of information systems
related to these infrastructures [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        In Africa, and more specifically in Benin, a
digitization efort has been initiated in recent years, along
with the establishment of laws and systems to secure
these infrastructures. However, the task is enormous,
and human and financial resources are scarce. This
situation increases the risks associated with the use of
digital technology [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The security of computer infrastructures is a
major concern for cybersecurity professionals due to the
significant disruptions and economic damages that
cyberattacks can cause. Therefore, it is essential to have
a good understanding of the security mechanisms
associated with the IT tools used by companies. Notably,
90% of companies use the Active Directory tool [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for
managing user and machine access and permissions.
Active Directory is a prime target for attackers seeking
to obtain sensitive information or take control of an
infrastructure, as it provides and controls access to all
of an organization’s resources [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Attackers constantly
seek to exploit vulnerabilities in IT infrastructures to
access sensitive information or disrupt business
activities.
      </p>
      <p>It is therefore necessary for companies and
organizations to gain better knowledge of the potential attacks
they might face. For this purpose, the MITRE
organization, in collaboration with many other organizations</p>
      <p>CEUR</p>
      <p>
        ceur-ws.org
worldwide, has created the MITRE ATT&amp;CK®
platform, which lists the techniques used by attackers of
information systems. Cybersecurity professionals use
it to assess the security posture of organizations’
information systems. They can use the techniques listed
by MITRE for attack emulation exercises, providing a
better view of the security measures applied to these
information systems [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>In the fight against cyberattacks, the main objective
of this work is to provide appropriate
recommendations to companies and organizations to further secure
their information systems. To achieve this, we will
explore the techniques listed on the MITRE ATT&amp;CK®
platform to simulate attack scenarios against Active
Directory managed infrastructures, which will be
documented.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature review</title>
      <p>This section presents some concepts related to the study
conducted and some work done on the subject.</p>
      <sec id="sec-2-1">
        <title>2.1. Active Directory</title>
        <p>
          The Active Directory tool stores information about
network objects and makes it available to users and
network administrators so they can find and use it quickly
[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>It allows centralized, secure, and scalable
management of resources represented by objects, classified
according to their name and attributes. These objects
can include users, computers, groups, resources, and
other IT infrastructure elements.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Attack phases against domain environments</title>
        <p>Attacks against domain environments typically occur
in several stages as shown in Figure 1.</p>
        <p>Briefly, these stages are:
1. Compromise of a domain machine: This
can be done via an open port, an application on
the domain, or physical access to the machine.
2. Internal reconnaissance or information
gathering: This is done by executing
individual commands or a script to obtain information
about the vulnerabilities of the compromised
machine.
3. Local privilege escalation: This involves
exploiting discovered vulnerabilities to gain
higher permissions on the machine.
4. Access to domain administrator
credentials: This involves using tools or scripts to
search for domain administrator credentials
from the compromised machine.
5. Action: Exploiting previously obtained
credentials to take control of the domain.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Blue and Red Teams</title>
        <p>
          Red teams orchestrate sophisticated attacks to exploit
the vulnerabilities of the involved systems [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Blue
teams, on the other hand, protect digital assets by
detecting and neutralizing various attacks from Red teams
[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>
          Both types of teams play an important role in
securing information systems. They help determine essential
parameters for the security of information systems,
facilitating the role of Information Security Management
Systems (ISMS) [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Information System</title>
        <p>
          An information system is a set of interconnected
elements whose purpose is to collect, store, process, and
disseminate information within the organization or
company. It aims to facilitate decision-making
processes, optimize internal operations, and improve
communication and collaboration [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>2.5. Related work</title>
        <p>Many authors have conducted instructive studies on the
attacks targeting infrastructures related to the Active
Directory tool.</p>
        <p>
          Among them, Oni Bamidele and Aboubakar
Kpelafiya [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] first present the basic architectures of
Windows and Linux Active Directory, as well as the
related concepts. They then explain the main
vulnerabilities observed in these types of infrastructures, along
with several attack methods exploiting these
vulnerabilities, such as using tools like Powersploit or even
Powershell.
        </p>
        <p>
          From a more general perspective, Mokhtar BI et al.
[
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] present the attack phases observed at the Active
Directory domain level. They explain the most popular
types of attacks, such as exploiting the Kerberos
authentication protocol. The authors illustrate a typical
attack with the test environment set up.
        </p>
        <p>
          C. D. Motero et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] present a study focused on
attacks targeting the Kerberos authentication protocol.
This study was conducted by following defined steps,
such as setting up a virtual test environment, collecting
information about the domain users, gathering tools for
various attacks, and documenting these attacks. They
add detection and prevention methods specific to the
implemented attacks.
        </p>
        <p>
          Pektaş Abdurrahman, in this article [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], presents
penetration testing methods and emphasizes those
effective for Microsoft environments.
        </p>
        <p>
          MITRE ATT&amp;CK® helps to develop threat models
and specific methodologies for the private sector,
public administrations, and the cybersecurity community,
gathering known attack techniques [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Material and Methods</title>
      <p>In this section, we used specific material and several
methods.</p>
      <sec id="sec-3-1">
        <title>3.1. Material</title>
        <p>We set up a test domain environment using a local
network.</p>
        <p>Figure 2 shows the material used, as well as the
operating systems and users set up on the simulated domain
machines.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Methods</title>
        <p>The work highlighted the phases of an attack against
a domain environment during a scenario. We started
with the following assumptions:
• H-1: The administrator has just created the
domain, and their primary goal was to allow users
to exploit this Active Directory (AD) managed
domain for file sharing. The default security
mechanisms enabled are Windows Defender
antivirus, AMSI (Antimalware Scan Interface),
and the firewall.
• H-2: The attacker has already compromised a
low-privilege account.</p>
        <p>
          We then proceeded with the steps shown in Figure 4
to simulate an attack scenario against the set-up
infrastructure.
• T1082 System Information Discovery [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]:
It involves collecting detailed information about
the operating system and hardware, including
the version, patches, service packs, and
architecture of the compromised machine.
• T1087 Account Discovery [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]: It allows
obtaining a list of valid accounts, usernames, or
email addresses on a system.
• T1069 Permission Groups Discovery [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]:
It helps determine available user accounts and
groups, the membership of users in specific
groups, and users and groups with elevated
permissions.
• T1562.006 Impair Defenses: Indicator
Blocking [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]: This involves attempting to
prevent the collection and analysis of indicators or
events typically captured by sensors such as the
Anti-Malware Scan Interface. This technique
allowed us to evade antivirus detection during
the execution of the used scripts.
• T1036.005 Masquerading: Match
Legitimate Name or Location [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]: This allowed
us to replace a legitimate executable with
another file having the same name. The latter
resulted from the compilation of the custom
script script.c and enabled the elevation of
privileges from a compromised standard user to a
local administrator.
• T1555 Credentials from Password Stores
[
          <xref ref-type="bibr" rid="ref23">23</xref>
          ] and T1003 OS Credential Dumping [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]:
We implemented these techniques using the
arguments employed during the execution of the
Invoke-Mimikatz.ps1 script (figure 5).
        </p>
        <p>
          According to this article on the secrets of Mimikatz
[
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], these arguments correspond to:
• privilege::debug: Obtain debugging rights as
this access right is necessary for the execution
of many Mimikatz commands;
• token::elevate: Impersonate a token. It is used
to elevate permissions to those of the SYSTEM
user or an administrator;
• sekurlsa::tickets /export: List all available
Kerberos tickets for all recently authenticated
users;
• lsadump::dcsync: Impersonate a
highprivilege user to retrieve the password hashes
of domain users from the domain controller;
• lsadump::sam: Use the SysKey to decrypt
SAM entries. The ”sam” option connects to the
local Security Account Manager (SAM) database
and extracts the credentials of local accounts;
• lsadump::cache: Retrieve user information
from the machine’s MSCache;
• sekurlsa::logonPasswords: List all available
logon credential managers. It typically shows
the logon credentials of users currently or
recently logged into the machine
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results and recommendations</title>
      <p>This section presents the results obtained and the
recommendations given.</p>
      <sec id="sec-4-1">
        <title>4.1. Results obtained at the end of the scenario</title>
        <p>At the end of our scenario, we obtained the credentials
of users who logged into the domain from the
compromised machine.</p>
        <p>Figure 6 shows the username and password in
MsCache v2 format of these users, as they were found
after the execution of the Invoke-Mimikatz.ps1 script.</p>
        <p>Summary of Recommendations
Vulnerabilities</p>
        <p>Attacks</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Recommendations</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Perspectives</title>
      <p>This work highlighted the dangers to which domain
environments are exposed in case of misconfiguration
through a scenario and proposed appropriate
recommendations to mitigate them. Using techniques from
the MITRE ATT&amp;CK® framework allowed for a
better understanding of the variety of attack techniques.
This scenario is the first of a long list of possible attack
scenarios currently being implemented.</p>
      <p>There are a large number of attack techniques on
MITRE ATT&amp;CK®. Therefore, it would be interesting
to carry out other scenarios with these techniques and
even other access management tools such as JumpCloud
and Azure Active Directory.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Qu</surname>
          </string-name>
          <article-title>'est-ce que l'infrastructure IT</article-title>
          ?,
          <year>2023</year>
          . URL: https://www.ibm.com/fr-fr/topics/infrastructure.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Ö.</given-names>
            <surname>Aslan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Aktuğ</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ozkan-Okay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Yilmaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Akin</surname>
          </string-name>
          ,
          <article-title>A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions</article-title>
          ,
          <source>Electronics</source>
          <volume>12</volume>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Paysages</given-names>
            <surname>Des Cybermenaces en Afrique</surname>
          </string-name>
          en
          <year>2023</year>
          ,
          <year>2023</year>
          . URL: https://afcsm.com
          <article-title>/ paysages-des-cybermenaces-en-afrique-en-</article-title>
          <year>2023</year>
          /.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Gestion des accès Active Directory</article-title>
          , https://www. isdecisions.fr/gestion-acces
          <string-name>
            <surname>-</surname>
          </string-name>
          active-directory/,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B. I.</given-names>
            <surname>Mokhtar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Jurcut</surname>
          </string-name>
          , M. S. ElSayed,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Azer</surname>
          </string-name>
          ,
          <article-title>Active directory attacks-steps, types, and signatures</article-title>
          ,
          <source>Electronics</source>
          <volume>11</volume>
          (
          <year>2022</year>
          ). URL: https: //www.mdpi.com/2079-9292/11/16/2629. doi:
          <volume>10</volume>
          . 3390/electronics11162629.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Ajmal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Maple</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Asghar</surname>
          </string-name>
          , S. U. Islam,
          <article-title>Ofensive security: Towards proactive threat hunting via adversary emulation</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .
          <volume>3104260</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7] iainfoulds, Présentation des services de domaine Active Directory, https: //learn.microsoft.com/fr-fr/
          <article-title>windows-server/ identity/ad-ds/get-started/virtual-dc/ active-directory-domain-services-</article-title>
          <string-name>
            <surname>overview</surname>
          </string-name>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] The threat landscape | Microsoft Press Store - microsoftpressstore</article-title>
          .com,
          <year>2019</year>
          . URL: https://www.microsoftpressstore.com/articles/ article.aspx?p=
          <volume>2992603</volume>
          &amp;seqNum=
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Chindrus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.-F.</given-names>
            <surname>Caruntu</surname>
          </string-name>
          ,
          <article-title>Securing the network: A red and blue cybersecurity competition case study</article-title>
          ,
          <source>Information</source>
          <volume>14</volume>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>CyberSecura</surname>
          </string-name>
          ,
          <article-title>La norme ISO 27001 et le</article-title>
          <string-name>
            <surname>SMSI (Système de Management de la Sécurité de l'Information</surname>
          </string-name>
          ), https://medium. com/cybersecurity-and
          <article-title>-gdpr-compliance/ la-norme-</article-title>
          <string-name>
            <surname>iso-</surname>
          </string-name>
          27001
          <string-name>
            <surname>-</surname>
          </string-name>
          et-le
          <article-title>-smsi-syst%C3% A8me-de-management-de-la-s%C3%A9curit%</article-title>
          <string-name>
            <surname>C3%A9-de-</surname>
          </string-name>
          linformation-304a1fae59dd,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Robert</surname>
          </string-name>
          ,
          <article-title>Système d'information (si): Qu'est-ce que c'est</article-title>
          ?,
          <year>2023</year>
          . URL: https://datascientest.com
          <article-title>/ systeme-dinformation-tout-savoir.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Oni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kpelafiya</surname>
          </string-name>
          ,
          <article-title>Windows active directory vs</article-title>
          .
          <source>linux directory services</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>C. D. Motero</surname>
            ,
            <given-names>J. R. B.</given-names>
          </string-name>
          <string-name>
            <surname>Higuera</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          <string-name>
            <surname>Higuera</surname>
            ,
            <given-names>J. A. S.</given-names>
          </string-name>
          <string-name>
            <surname>Montalvo</surname>
            ,
            <given-names>N. G.</given-names>
          </string-name>
          <string-name>
            <surname>Gómez</surname>
          </string-name>
          ,
          <article-title>On attacking kerberos authentication protocol in windows active directory services: A practical survey</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>109289</fpage>
          -
          <lpage>109319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pektaş</surname>
          </string-name>
          ,
          <article-title>Practical approach for securing windows environment: Attack vectors and countermeasures</article-title>
          ,
          <source>International Journal of Network Security &amp; Its Applications (IJNSA)</source>
          Vol
          <volume>9</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>MITRE</surname>
            <given-names>ATT</given-names>
          </string-name>
          &amp;CK, https://attack.mitre.org/,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] PowerSploit/Privesc at master · PowerShellMafia/PowerSploit, https://github.com/ PowerShellMafia/PowerSploit/tree/master/ Privesc,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Mimikatz</surname>
          </string-name>
          , https://adsecurity.org/?page_id=
          <year>1821</year>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>System</given-names>
            <surname>Information</surname>
          </string-name>
          <string-name>
            <surname>Discovery</surname>
          </string-name>
          ,
          <article-title>Technique T1082 - Enterprise | MITRE ATT&amp;CK</article-title>
          , https://attack.mitre. org/techniques/T1082,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Account</surname>
            <given-names>Discovery</given-names>
          </string-name>
          ,
          <article-title>Technique T1087 - Enterprise | MITRE ATT&amp;CK</article-title>
          , https://attack.mitre.org/ techniques/T1087,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Permission</given-names>
            <surname>Groups</surname>
          </string-name>
          <string-name>
            <surname>Discovery</surname>
          </string-name>
          ,
          <article-title>Technique T1069 - Enterprise | MITRE ATT&amp;CK</article-title>
          , https://attack.mitre. org/techniques/T1069,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Impair</surname>
            <given-names>Defenses: Indicator</given-names>
          </string-name>
          <string-name>
            <surname>Blocking</surname>
          </string-name>
          ,
          <source>Subtechnique T1562</source>
          .
          <fpage>006</fpage>
          - Enterprise | MITRE ATT&amp;CK, https://attack.mitre.org/techniques/ /T1562/006/,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <article-title>Masquerading: Match Legitimate Name or Location, Sub-technique T1036</article-title>
          .
          <fpage>005</fpage>
          - Enterprise | MITRE ATT&amp;CK, https://attack.mitre.org/ techniques/T1036/005/,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <article-title>Credentials from Password Stores, Technique T1555 - Enterprise | MITRE ATT&amp;CK</article-title>
          , https:// attack.mitre.org/techniques/T1555/,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <article-title>Os credential dumping, technique t1003 - enterprise | MITRE ATT&amp;CK</article-title>
          , https://attack.mitre.org/ techniques/T1003/,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <article-title>[25] iainfoulds, Best Practices for Securing Active Directory</article-title>
          , https://learn. microsoft.com/en-us/windows-server/ identity/ad-ds/plan/security-best
          <article-title>-practices/ best-practices-for-securing-active-</article-title>
          <string-name>
            <surname>directory</surname>
          </string-name>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>