
2
00:00:02,400 –> 00:00:07,560
Patches drift like red-shifted signals, passwords orbit forever,
3
00:00:07,560 –> 00:00:11,760
a domain controller from another era hums as if alone.
4
00:00:11,760 –> 00:00:15,400
Inside, threads of services trade secrets like starlight,
5
00:00:15,400 –> 00:00:18,800
tickets, trusts, shares. We call it normal operations.
6
00:00:18,800 –> 00:00:23,600
It is surface tension. A single misconfiguration bends the field.
7
00:00:23,600 –> 00:00:27,120
Legacy protocol. A forgotten share.
8
00:00:27,120 –> 00:00:29,360
The attacker does not force entry.
9
00:00:29,360 –> 00:00:34,960
They follow gravity. Tonight we descend. Domains as galaxies.
10
00:00:34,960 –> 00:00:39,520
Trusts as wormholes. Controllers as singularities.
11
00:00:39,520 –> 00:00:43,520
We will map, exploit, and reinforce the fabric.
12
00:00:43,520 –> 00:00:46,680
Record, audit, listen, enter.
13
00:00:46,680 –> 00:00:50,280
Windows infrastructure. The first coordinates form.
14
00:00:50,280 –> 00:00:53,760
We fall. The universe of Windows infrastructure.
15
00:00:53,760 –> 00:00:57,760
We begin with a simple truth. Data has its own gravity.
16
00:00:57,760 –> 00:01:01,360
Windows infrastructure is not a diagram. It is a cosmos.
17
00:01:01,360 –> 00:01:05,520
Workgroups form dust. Domains ignite into stars.
18
00:01:05,520 –> 00:01:11,040
Forests bind into galaxies. Trusts, tunnel-like wormholes between them.
19
00:01:11,040 –> 00:01:15,320
Power BI does not simply show us. The directory defines us.
20
00:01:15,320 –> 00:01:19,720
Roles coalesce. Domain controllers as cores.
21
00:01:19,720 –> 00:01:24,200
FSMO rolls as spin. DNS as navigation.
22
00:01:24,200 –> 00:01:27,200
Group policy as the laws that hold it all together.
23
00:01:27,200 –> 00:01:29,200
But time has its own opinion.
24
00:01:29,200 –> 00:01:33,480
Misconfigurations create curvature. Drift accumulates.
25
00:01:33,480 –> 00:01:35,800
Authentication bends around mass.
26
00:01:35,800 –> 00:01:38,600
Kerberos and TLM tokens packs.
27
00:01:38,600 –> 00:01:42,320
Attackers do not rush. They listen for pressure gradients.
28
00:01:42,320 –> 00:01:44,720
And fall along the easiest slope.
29
00:01:44,720 –> 00:01:48,600
We will move from the outer halo to the singular core.
30
00:01:48,600 –> 00:01:52,480
Enumeration as astronomy. Privileges fuel.
31
00:01:52,480 –> 00:01:57,160
Credentials as radiation and delegation as curved space.
32
00:01:57,160 –> 00:02:00,600
Each concept will arrive paired with its counter force.
33
00:02:00,600 –> 00:02:03,960
Hygiene segmentation baselines monitoring.
34
00:02:03,960 –> 00:02:07,960
And in those rare moments, we will let the system speak for itself.
35
00:02:07,960 –> 00:02:10,520
A quiet chime when drift begins.
36
00:02:10,520 –> 00:02:12,640
A base pulse when identity bends.
37
00:02:12,640 –> 00:02:17,840
The goal is not invincibility. The goal is orbit, stable, deliberate, sustained against
38
00:02:17,840 –> 00:02:19,680
fear and noise.
39
00:02:19,680 –> 00:02:24,400
From workgroup dust to domain galaxies, we start with a single machine.
40
00:02:24,400 –> 00:02:26,200
Unjoined, unobserved.
41
00:02:26,200 –> 00:02:28,840
A workgroup host is a rock in the void.
42
00:02:28,840 –> 00:02:32,400
Local accounts. Local policy. Local truths.
43
00:02:32,400 –> 00:02:35,040
It survives by isolation or by luck.
44
00:02:35,040 –> 00:02:38,000
There is no shared sky. No central gravity.
45
00:02:38,000 –> 00:02:41,280
Every login is a coin toss against entropy.
46
00:02:41,280 –> 00:02:43,120
Add another machine.
47
00:02:43,120 –> 00:02:46,160
A printer server. A file share.
48
00:02:46,160 –> 00:02:49,840
Human habit begins to braid threads across them.
49
00:02:49,840 –> 00:02:51,320
Mapped drives.
50
00:02:51,320 –> 00:02:56,360
Remembered passwords, a script that copies reports at midnight.
51
00:02:56,360 –> 00:02:57,800
Constraint appears.
52
00:02:57,800 –> 00:02:59,120
So does risk.
53
00:02:59,120 –> 00:03:02,920
This is proto-gravity, fragile, improvised.
54
00:03:02,920 –> 00:03:04,800
Then a domain arrives.
55
00:03:04,800 –> 00:03:06,400
Active directory.
56
00:03:06,400 –> 00:03:08,280
Domain services is not a database.
57
00:03:08,280 –> 00:03:11,280
It is the mass that gives shape to the enterprise.
58
00:03:11,280 –> 00:03:12,800
We promote a server.
59
00:03:12,800 –> 00:03:14,600
It becomes a domain controller.
60
00:03:14,600 –> 00:03:17,720
At that moment, identity stops being provincial.
61
00:03:17,720 –> 00:03:20,120
It becomes interstellar.
62
00:03:20,120 –> 00:03:21,920
And stops being a handshake.
63
00:03:21,920 –> 00:03:23,760
It becomes a curve.
64
00:03:23,760 –> 00:03:26,280
Domain controllers do not simply respond.
65
00:03:26,280 –> 00:03:27,680
They define.
66
00:03:27,680 –> 00:03:31,720
They hold the schema, the replication topology, the naming context.
67
00:03:31,720 –> 00:03:34,720
FSMO rolls emerge like spins and tides.
68
00:03:34,720 –> 00:03:37,320
The schema master governs evolution.
69
00:03:37,320 –> 00:03:40,440
The domain naming master approves new worlds.
70
00:03:40,440 –> 00:03:45,160
The arid master mince identities ensuring no two stars share a name.
71
00:03:45,160 –> 00:03:50,040
The PDC emulator sets the clock, and therefore sets truth.
72
00:03:50,040 –> 00:03:52,760
Domed drift is security drift.
73
00:03:52,760 –> 00:03:59,360
The infrastructure master maintains references the quiet librarian of a growing galaxy.
74
00:03:59,360 –> 00:04:01,680
Move one carelessly and you change the tides.
75
00:04:01,680 –> 00:04:04,840
Lose one unknowingly and satellites begin to wobble.
76
00:04:04,840 –> 00:04:06,240
Member servers join the field.
77
00:04:06,240 –> 00:04:07,240
They are not peers.
78
00:04:07,240 –> 00:04:08,400
They are orbiters.
79
00:04:08,400 –> 00:04:11,080
They borrow authority from the core.
80
00:04:11,080 –> 00:04:16,440
Services resolve through DNS, which becomes the navigation system for everything alive.
81
00:04:16,440 –> 00:04:18,560
If DNS lies, everything follows.
82
00:04:18,560 –> 00:04:22,280
A poisoned map does not look dangerous until ships never arrive.
83
00:04:22,280 –> 00:04:28,700
In windows, a misdirected SPN, a spoofed record, a stale glue entry, each is a fold in the
84
00:04:28,700 –> 00:04:33,040
chart, a way to bend the traveler toward a trap.
85
00:04:33,040 –> 00:04:36,840
Forests form when separate domains share a root of trust.
86
00:04:36,840 –> 00:04:41,240
Trees anchor under common schema and configuration.
87
00:04:41,240 –> 00:04:47,960
Forests are galaxies, vast internally transitive, opinionated about consistency.
88
00:04:47,960 –> 00:04:50,920
Across them, trusts create shortcuts through space.
89
00:04:50,920 –> 00:04:54,040
Summer forests, trusts, grand and transitive.
90
00:04:54,040 –> 00:04:56,520
Summer external, brittle and non-transitive.
91
00:04:56,520 –> 00:05:01,000
Summer shortcuts, built to appease latency and human patience.
92
00:05:01,000 –> 00:05:04,680
Each trust is a wormhole, stable when engineered with care.
93
00:05:04,680 –> 00:05:06,440
Chaotic when neglected.
94
00:05:06,440 –> 00:05:09,040
Every line of trust is a new gradient.
95
00:05:09,040 –> 00:05:11,240
Every gradient can be followed.
96
00:05:11,240 –> 00:05:14,280
Security does not fail with noise, it fails with inertia.
97
00:05:14,280 –> 00:05:17,160
We add a test trust for a merger that never closes.
98
00:05:17,160 –> 00:05:18,480
It remains.
99
00:05:18,480 –> 00:05:21,680
We create an external trust for a vendor integration.
100
00:05:21,680 –> 00:05:24,040
The vendor changes, the trust does not.
101
00:05:24,040 –> 00:05:26,240
The directory remembers everything.
102
00:05:26,240 –> 00:05:28,480
Attackers remember only what is useful.
103
00:05:28,480 –> 00:05:31,320
Group policy arrives as the laws of physics.
104
00:05:31,320 –> 00:05:33,040
Baselines define what is possible.
105
00:05:33,040 –> 00:05:34,320
Who can log on locally?
106
00:05:34,320 –> 00:05:37,960
Which protocols are allowed to speak, whether signing is enforced?
107
00:05:37,960 –> 00:05:41,080
Whether passwords are bounded by entropy rather than tradition.
108
00:05:41,080 –> 00:05:44,560
When laws are miswritten, attackers do not argue.
109
00:05:44,560 –> 00:05:46,600
They obey with precision.
110
00:05:46,600 –> 00:05:51,000
A GPO that grants local admin to a temporary desktop support
111
00:05:51,000 –> 00:05:54,480
group outlives the person who created it.
112
00:05:54,480 –> 00:05:56,520
Gravity does not care about intent.
113
00:05:56,520 –> 00:05:58,280
Now, consider the roles again.
114
00:05:58,280 –> 00:06:00,200
Domain controllers are gravity wells.
115
00:06:00,200 –> 00:06:03,400
Their mass is credential validation, ticket issuance,
116
00:06:03,400 –> 00:06:05,280
directory integrity.
117
00:06:05,280 –> 00:06:09,120
Services orbit closer or farther based on privilege.
118
00:06:09,120 –> 00:06:11,640
A file server is a moon with resources.
119
00:06:11,640 –> 00:06:15,160
A print server is a satellite with side effects,
120
00:06:15,160 –> 00:06:19,000
often under-defended, often trusted, more than it should be.
121
00:06:19,000 –> 00:06:23,080
An application server with an SPN is a bright star.
122
00:06:23,080 –> 00:06:25,760
It emits service tickets and therefore draws attention.
123
00:06:25,760 –> 00:06:29,080
If that star is configured with unconstrained delegation,
124
00:06:29,080 –> 00:06:30,840
it becomes a furnace.
125
00:06:30,840 –> 00:06:35,520
Tickets gather, TGTs flow, heat invites collapse.
126
00:06:35,520 –> 00:06:38,360
Member workstations are dust in the lanes.
127
00:06:38,360 –> 00:06:41,560
They carry cashed trust, tokens in memory,
128
00:06:41,560 –> 00:06:45,640
sessions that care about convenience more than conservation.
129
00:06:45,640 –> 00:06:48,240
The local security authority holds the key ring.
130
00:06:48,240 –> 00:06:51,240
If left unshielded, it will share under pressure.
131
00:06:51,240 –> 00:06:54,160
Credential guard and LSA protection are not features.
132
00:06:54,160 –> 00:06:56,000
They are radiation shields.
133
00:06:56,000 –> 00:06:58,760
We must name the shape so we can measure the drift.
134
00:06:58,760 –> 00:07:02,840
A forest can trust another forest.
135
00:07:02,840 –> 00:07:04,920
The wormhole is transitive.
136
00:07:04,920 –> 00:07:08,200
What is trusted inside one may leap across to the other.
137
00:07:08,200 –> 00:07:10,800
An external trust is a narrow tunnel.
138
00:07:10,800 –> 00:07:15,000
It does not grant transit beyond the farmhouse.
139
00:07:15,000 –> 00:07:20,200
Shortcut trusts are bridges built to cross the chasm of latency.
140
00:07:20,200 –> 00:07:23,200
They often become smugglers’ roads.
141
00:07:23,200 –> 00:07:25,240
And each trust has directionality.
142
00:07:25,240 –> 00:07:27,040
One way is a gate with a guard.
143
00:07:27,040 –> 00:07:29,360
Two way is a celebration that never ends.
144
00:07:29,360 –> 00:07:31,880
Most people think security begins at the core.
145
00:07:31,880 –> 00:07:32,720
But they are wrong.
146
00:07:32,720 –> 00:07:37,360
It begins at the edge where dust decides whether to gather.
147
00:07:37,360 –> 00:07:43,180
That creates policies, naming discipline, groups, scopes, and the humility to keep tear
148
00:07:43,180 –> 00:07:44,340
small.
149
00:07:44,340 –> 00:07:46,880
These are acts of defiance against the unknown.
150
00:07:46,880 –> 00:07:49,680
We keep domain admin as myths, not as convenience.
151
00:07:49,680 –> 00:07:53,160
We keep service accounts bound by least privilege, not tradition.
152
00:07:53,160 –> 00:08:00,760
We keep the KRBTGT periodic reset as ritual, a calendared acknowledgement that secrets decay.
153
00:08:00,760 –> 00:08:02,240
Listen for the system’s whisper.
154
00:08:02,240 –> 00:08:05,080
A low chime when drift begins.
155
00:08:05,080 –> 00:08:08,920
Trusted domain goes offline and nobody notices.
156
00:08:08,920 –> 00:08:11,800
A base pulse when identity bends.
157
00:08:11,800 –> 00:08:16,640
A service account added to backup operators just for a week.
158
00:08:16,640 –> 00:08:20,760
The map darkens, the gravity shifts, the next orbit begins.
159
00:08:20,760 –> 00:08:22,320
We anchor the picture.
160
00:08:22,320 –> 00:08:23,800
Workgroup dust.
161
00:08:23,800 –> 00:08:24,800
Domain ignition.
162
00:08:24,800 –> 00:08:26,280
Forest gravity.
163
00:08:26,280 –> 00:08:27,480
Trust wormholes.
164
00:08:27,480 –> 00:08:29,000
Group policy as physics.
165
00:08:29,000 –> 00:08:30,640
DNS is navigation.
166
00:08:30,640 –> 00:08:32,720
Domain controllers are singularities.
167
00:08:32,720 –> 00:08:35,200
Each decision adds mass or removes it.
168
00:08:35,200 –> 00:08:37,440
Each exception changes curvature.
169
00:08:37,440 –> 00:08:43,200
And when fabric lights them up on our horizon, we will see not chaos, but consequence.
170
00:08:43,200 –> 00:08:45,080
The universe still wants to be understood.
171
00:08:45,080 –> 00:08:46,800
Let us measure before we move.
172
00:08:46,800 –> 00:08:48,160
Let us map before we run.
173
00:08:48,160 –> 00:08:49,480
We have named the bodies.
174
00:08:49,480 –> 00:08:51,280
Now we chart the light.
175
00:08:51,280 –> 00:08:52,800
The critical services.
176
00:08:52,800 –> 00:08:54,120
Stars in the core.
177
00:08:54,120 –> 00:08:58,280
We descend toward the core and find the constants that define motion.
178
00:08:58,280 –> 00:09:02,240
DNS DHCP directory services file and print group policy.
179
00:09:02,240 –> 00:09:03,320
Each is not a feature.
180
00:09:03,320 –> 00:09:04,320
Each is a star.
181
00:09:04,320 –> 00:09:05,760
Their light sets the lanes.
182
00:09:05,760 –> 00:09:09,120
Their gravity decides what orbits and what falls.
183
00:09:09,120 –> 00:09:10,120
Start with DNS.
184
00:09:10,120 –> 00:09:11,320
It is not a phone book.
185
00:09:11,320 –> 00:09:12,920
It is navigation.
186
00:09:12,920 –> 00:09:14,560
Every curve or exchange.
187
00:09:14,560 –> 00:09:16,080
Every SMB path.
188
00:09:16,080 –> 00:09:20,320
Every policy retrieval begins by asking where reality lives.
189
00:09:20,320 –> 00:09:22,880
If DNS lies, everything follows.
190
00:09:22,880 –> 00:09:26,200
A poisoned record bends routes toward an attacker’s shore.
191
00:09:26,200 –> 00:09:32,640
A stale SPN mapping points a service ticket at the wrong host and silently sabotages trust.
192
00:09:32,640 –> 00:09:37,600
Split brain zones with careless scavenging cause phantom hosts to remain.
193
00:09:37,600 –> 00:09:40,280
And clients continue to orbit ghosts.
194
00:09:40,280 –> 00:09:46,640
In this universe, a single TXT record used for a forgotten validation remains an unguarded
195
00:09:46,640 –> 00:09:47,720
beacon.
196
00:09:47,720 –> 00:09:53,400
And a wildcard thought harmless becomes a dark lens that distorts resolution.
197
00:09:53,400 –> 00:09:59,520
Split as if it were the map itself, signed zones, tight update permissions, scavenging with
198
00:09:59,520 –> 00:10:04,800
intention, and collectors that notice when a critical hosts address changes outside a
199
00:10:04,800 –> 00:10:06,320
maintenance tide.
200
00:10:06,320 –> 00:10:08,680
DHCP is breath.
201
00:10:08,680 –> 00:10:10,480
Leases are pulses.
202
00:10:10,480 –> 00:10:14,960
When scope options drift, clients inherit a future they did not choose.
203
00:10:14,960 –> 00:10:18,680
A rogue DHCP server does not shout.
204
00:10:18,680 –> 00:10:24,040
It whispers a default gateway that leads away from inspection and toward ambush.
205
00:10:24,040 –> 00:10:27,040
Option 15 points them into a domain that is not theirs.
206
00:10:27,040 –> 00:10:31,280
Option 6 hands them a resolver that edits the sky.
207
00:10:31,280 –> 00:10:33,760
Reservations become identity anchors.
208
00:10:33,760 –> 00:10:38,440
Neglect turns them into fossils that attract confusion.
209
00:10:38,440 –> 00:10:40,240
The defense is choreography.
210
00:10:40,240 –> 00:10:47,200
DHCP snooping, authenticated updates bound to DNS with GSS T-SIG, scope hygiene that refuses
211
00:10:47,200 –> 00:10:52,160
convenience and a ledger that proves who promised the route.
212
00:10:52,160 –> 00:10:57,540
Active directory domain services sits at the center, naming contexts, replication,
213
00:10:57,540 –> 00:10:59,480
the KDC’s heartbeat.
214
00:10:59,480 –> 00:11:00,800
It is mass.
215
00:11:00,800 –> 00:11:06,480
The KDC issues TGTs like stellar passports, then stamps service tickets that curve toward
216
00:11:06,480 –> 00:11:09,120
SPNs, but time has its own opinion.
217
00:11:09,120 –> 00:11:13,320
Stale KRBTGT secrets thicken the past into permanence.
218
00:11:13,320 –> 00:11:16,400
Replication topology ignored becomes split brain reality.
219
00:11:16,400 –> 00:11:21,840
Slingering objects are debris that collide with truth when a tombstone threshold is crossed.
220
00:11:21,840 –> 00:11:23,760
We harden by ritual.
221
00:11:23,760 –> 00:11:27,200
Health checks that read replication as seismography.
222
00:11:27,200 –> 00:11:34,120
KRBTGT rotation as celestial mechanics, privileged access seal to tear boundaries, and audits
223
00:11:34,120 –> 00:11:39,600
that verify the semantic layer, the groups, the rights, the delegations, reflect present
224
00:11:39,600 –> 00:11:42,480
intent, not ancestral habit.
225
00:11:42,480 –> 00:11:45,760
SMB and file servers are supply routes.
226
00:11:45,760 –> 00:11:51,440
They carry payloads, policies, tools, secrets disguised as convenience.
227
00:11:51,440 –> 00:11:58,240
A share labeled software becomes an uncurrated nebula where unsigned binaries drift next to
228
00:11:58,240 –> 00:12:01,560
installers that request elevation.
229
00:12:01,560 –> 00:12:04,040
Scripts accumulate like comets.
230
00:12:04,040 –> 00:12:09,360
Someone adds credentials for automation, and suddenly, gravity acquires a handle.
231
00:12:09,360 –> 00:12:13,000
SMB signing is not a checkbox, it is structural integrity.
232
00:12:13,000 –> 00:12:17,600
Without it, NTLM relays rewrite routes in flight.
233
00:12:17,600 –> 00:12:21,600
Access control lists are not bureaucracy, they are orbital fences.
234
00:12:21,600 –> 00:12:23,880
Leased privilege is not minimalism.
235
00:12:23,880 –> 00:12:25,840
It is stable mechanics.
236
00:12:25,840 –> 00:12:26,840
Readers read.
237
00:12:26,840 –> 00:12:27,840
Writer’s right.
238
00:12:27,840 –> 00:12:29,440
Costodians curate.
239
00:12:29,440 –> 00:12:32,400
And no one combines roles without consequence.
240
00:12:32,400 –> 00:12:36,280
Print servers are the underestimated satellites with tidal influence.
241
00:12:36,280 –> 00:12:40,000
They sit near every workstation, trusted by necessity.
242
00:12:40,000 –> 00:12:42,760
Historically noisy, often patched last.
243
00:12:42,760 –> 00:12:47,400
They bridge, user context, and elevated service behavior.
244
00:12:47,400 –> 00:12:50,360
A spooler misconfigured becomes a relay mirror.
245
00:12:50,360 –> 00:12:56,040
A driver package signed in an age of lenience continues to install with ceremony.
246
00:12:56,040 –> 00:13:03,280
We contain by narrowing the blast cone, disable what is not required, isolate roles, force
247
00:13:03,280 –> 00:13:08,600
updates to occur within windows that are watched and treat printer administration as a tier
248
00:13:08,600 –> 00:13:11,360
one boundary, not an afterthought.
249
00:13:11,360 –> 00:13:12,560
Group policy is the law.
250
00:13:12,560 –> 00:13:16,000
It falls like gravity from the core to the edge.
251
00:13:16,000 –> 00:13:17,920
It is how we write the constants.
252
00:13:17,920 –> 00:13:23,880
Password length, Kerberos hardening, SMB signing, script execution, LSA protection, but
253
00:13:23,880 –> 00:13:25,240
law can be forged.
254
00:13:25,240 –> 00:13:30,080
Link order and inheritance are rivers that can be damned or diverted.
255
00:13:30,080 –> 00:13:36,200
A single high precedence GPO created for a midnight rescue remains linked, overrides
256
00:13:36,200 –> 00:13:38,240
a baseline and weakens the hull.
257
00:13:38,240 –> 00:13:41,160
We defend by publishing Constitution and Court.
258
00:13:41,160 –> 00:13:48,560
A baseline set sealed, change control that requires signatures, WMI filters that are documented,
259
00:13:48,560 –> 00:13:54,840
and a drift detector that compares policy as defined versus policy as applied.
260
00:13:54,840 –> 00:13:57,000
The universe still wants to be understood.
261
00:13:57,000 –> 00:13:59,720
Group policy is the language we use to define it.
262
00:13:59,720 –> 00:14:04,800
Now connect them, DNS tells us where DHCP tells us how to breathe, directory tells us who.
263
00:14:04,800 –> 00:14:06,560
SMB carries what?
264
00:14:06,560 –> 00:14:08,960
Print translates desire into matter.
265
00:14:08,960 –> 00:14:10,640
Group policy binds them with law.
266
00:14:10,640 –> 00:14:12,680
When one bends, the others accommodate.
267
00:14:12,680 –> 00:14:14,440
When two bend, the fabric ripples.
268
00:14:14,440 –> 00:14:16,560
When three bend, orbit decays.
269
00:14:16,560 –> 00:14:18,120
Listen for the signs.
270
00:14:18,120 –> 00:14:20,880
A low chime, when drift begins.
271
00:14:20,880 –> 00:14:26,360
A DNS record for a controller shifts outside change windows.
272
00:14:26,360 –> 00:14:29,040
A base pulse when identity bends.
273
00:14:29,040 –> 00:14:35,560
A GPO link appears at the domain route with authenticated users, granted apply.
274
00:14:35,560 –> 00:14:40,760
Sysmon murmurs when a workstation reaches into LSAS with new intent.
275
00:14:40,760 –> 00:14:46,760
Event 4769 clusters when service tickets spike for a service that does not see new demand.
276
00:14:46,760 –> 00:14:48,760
The map darkens.
277
00:14:48,760 –> 00:14:51,120
Our response is not panic, it is physics.
278
00:14:51,120 –> 00:14:53,880
We sign, we segment, we baseline, we monitor.
279
00:14:53,880 –> 00:14:58,280
We accept that convenience is gravity and that every exception adds mass.
280
00:14:58,280 –> 00:15:00,320
We choose structure over folklore.
281
00:15:00,320 –> 00:15:04,360
We hold the constants so that everything else can move without falling.
282
00:15:04,360 –> 00:15:06,640
And the next orbit begins.
283
00:15:06,640 –> 00:15:09,280
Threat actors as astrophysicists.
284
00:15:09,280 –> 00:15:14,040
We speak of services and stars, but there are minds that study their motion and exploit
285
00:15:14,040 –> 00:15:15,520
their curves.
286
00:15:15,520 –> 00:15:18,000
Threat actors are not always loud invaders.
287
00:15:18,000 –> 00:15:20,640
They are often patient astronomers.
288
00:15:20,640 –> 00:15:22,800
They watch, they measure drift.
289
00:15:22,800 –> 00:15:25,080
They wait for gravity to do the work.
290
00:15:25,080 –> 00:15:27,200
At the edge are the opportunists.
291
00:15:27,200 –> 00:15:32,640
Script driven raiders who trawl the public sky for open ports and default configurations.
292
00:15:32,640 –> 00:15:34,040
They are comets.
293
00:15:34,040 –> 00:15:36,840
Bright, brief, destructive by inertia.
294
00:15:36,840 –> 00:15:39,400
They copy, paste, collide and leave debris.
295
00:15:39,400 –> 00:15:40,640
Their power is volume.
296
00:15:40,640 –> 00:15:42,160
Their weakness is noise.
297
00:15:42,160 –> 00:15:46,120
Baselines and sane defaults repel them like magnetic fields.
298
00:15:46,120 –> 00:15:49,720
Closer in our ransomware crews, they are engineers of entropy.
299
00:15:49,720 –> 00:15:54,240
They hunt for a foothold, then convert identity into leverage.
300
00:15:54,240 –> 00:15:56,440
Living off the land is their method.
301
00:15:56,440 –> 00:15:58,080
W. Shell as solar wind.
302
00:15:58,080 –> 00:16:00,320
W. M. I as silent thrust.
303
00:16:00,320 –> 00:16:02,360
PS remoteing as a glide path.
304
00:16:02,360 –> 00:16:08,600
They charge shares, harvest scripts, map local admin reuse and assemble the past the
305
00:16:08,600 –> 00:16:12,120
hash constellation until movement becomes inevitable.
306
00:16:12,120 –> 00:16:16,960
They do not need zero days when misconfiguration is constant gravity.
307
00:16:16,960 –> 00:16:23,000
Their signature is acceleration from a quiet credential to an orchestral shutdown.
308
00:16:23,000 –> 00:16:28,880
We counter not with theatrical defenses but with friction, laps rotation, SMB signing,
309
00:16:28,880 –> 00:16:34,040
local firewall rules that starve east-west traffic and privileged access that refuses
310
00:16:34,040 –> 00:16:36,200
to exist on work stations.
311
00:16:36,200 –> 00:16:38,080
Then there are the state aligned operators.
312
00:16:38,080 –> 00:16:39,760
They are patient physicists.
313
00:16:39,760 –> 00:16:41,680
They do not prize destruction.
314
00:16:41,680 –> 00:16:43,320
They prize persistence.
315
00:16:43,320 –> 00:16:49,640
They catalog trusts, name constraints and study Kerberus delegation like orbital mechanics.
316
00:16:49,640 –> 00:16:57,040
A stale KRBTGT is not merely a weakness, it is time frozen into fuel.
317
00:16:57,040 –> 00:17:02,320
An unconstrained delegation service is not simply misconfigured, it is a gravitational
318
00:17:02,320 –> 00:17:03,640
slingshot.
319
00:17:03,640 –> 00:17:07,760
They move slowly, often under the event horizon of routine.
320
00:17:07,760 –> 00:17:09,720
Their art is ambiguity.
321
00:17:09,720 –> 00:17:14,640
Normal process chains, plausible service queries innocent tickets.
322
00:17:14,640 –> 00:17:20,640
One must therefore be relational, not singular, correlation across accounts, services and
323
00:17:20,640 –> 00:17:24,320
hours, looking for curvature that cannot be faked.
324
00:17:24,320 –> 00:17:28,200
Inside our own galaxies, we find internal red teams.
325
00:17:28,200 –> 00:17:33,160
They are friendly constellations engineered to stress our laws without tearing them.
326
00:17:33,160 –> 00:17:38,240
They pressure test the hull, they whisper truths, the universe already knows.
327
00:17:38,240 –> 00:17:44,080
Local privilege escalation remains common when services run with lacks permissions.
328
00:17:44,080 –> 00:17:48,160
Backup operators can mint power if left unguarded.
329
00:17:48,160 –> 00:17:53,800
Printers and management servers are too often satellites with hidden tidal pull.
330
00:17:53,800 –> 00:17:57,160
When they find a path to domain admin they hold up a mirror.
331
00:17:57,160 –> 00:18:00,880
The reflection is not flattery, it is governance.
332
00:18:00,880 –> 00:18:02,520
Insiders are the dark matter.
333
00:18:02,520 –> 00:18:05,640
Not always malicious, often careless, sometimes hurried.
334
00:18:05,640 –> 00:18:07,480
A saved password in a script.
335
00:18:07,480 –> 00:18:10,520
A temporary GPO link left at the root.
336
00:18:10,520 –> 00:18:15,520
A service account created with domain admin because the change window was closing.
337
00:18:15,520 –> 00:18:19,040
Their fingerprints are everywhere because their intentions were practical.
338
00:18:19,040 –> 00:18:21,680
We must govern intention.
339
00:18:21,680 –> 00:18:24,320
Least privilege is not a moral demand.
340
00:18:24,320 –> 00:18:26,240
It is physics.
341
00:18:26,240 –> 00:18:29,280
Consequence scale down so collapse remains improbable.
342
00:18:29,280 –> 00:18:30,920
Tools are not villains.
343
00:18:30,920 –> 00:18:32,400
Power shell is a spectrum.
344
00:18:32,400 –> 00:18:33,400
WMI is a bus.
345
00:18:33,400 –> 00:18:34,400
P6SEC is a courier.
346
00:18:34,400 –> 00:18:35,920
They are neutral particles.
347
00:18:35,920 –> 00:18:39,480
Our task is to read their behavior in context.
348
00:18:39,480 –> 00:18:44,880
A burst of remote service creation across subnets at midnight is not an accident.
349
00:18:44,880 –> 00:18:51,280
An unusual Kerberos service ticket requested for a high value SPN by an account that never
350
00:18:51,280 –> 00:18:54,000
touched it before is not curiosity.
351
00:18:54,000 –> 00:18:56,920
Event relationships form constellations.
352
00:18:56,920 –> 00:18:59,200
We read them as astronomers, not romantics.
353
00:18:59,200 –> 00:19:00,920
Duel time is time dilation.
354
00:19:00,920 –> 00:19:05,440
The longer an intruder orbits without detection, the more their influence normalizes.
355
00:19:05,440 –> 00:19:08,440
What once felt like an anomaly begins to look like tide.
356
00:19:08,440 –> 00:19:09,440
This is drift.
357
00:19:09,440 –> 00:19:12,040
This is why baselines cannot be aspirational.
358
00:19:12,040 –> 00:19:13,360
They must be measured.
359
00:19:13,360 –> 00:19:15,600
We enforce Kerberos hardening.
360
00:19:15,600 –> 00:19:17,480
Retire NTLMV1.
361
00:19:17,480 –> 00:19:19,400
Enforce channel binding.
362
00:19:19,400 –> 00:19:23,000
Protect LSAs and seal tier with ritual.
363
00:19:23,000 –> 00:19:25,120
The law must be gravity not suggestion.
364
00:19:25,120 –> 00:19:26,800
And now the lab echoes begin.
365
00:19:26,800 –> 00:19:29,240
The system whispers when hands move.
366
00:19:29,240 –> 00:19:30,320
Low chime.
367
00:19:30,320 –> 00:19:31,640
Windows security.
368
00:19:31,640 –> 00:19:35,320
4769 clusters for a service that did not change.
369
00:19:35,320 –> 00:19:37,880
A curve forms.
370
00:19:37,880 –> 00:19:39,400
Base pulse.
371
00:19:39,400 –> 00:19:40,880
This month event 10.
372
00:19:40,880 –> 00:19:44,880
A process reaches for LSAs with unusual intent.
373
00:19:44,880 –> 00:19:45,880
Soft tick.
374
00:19:45,880 –> 00:19:49,240
A GPO link appears where no change was scheduled.
375
00:19:49,240 –> 00:19:50,240
We listen.
376
00:19:50,240 –> 00:19:51,240
We name the force.
377
00:19:51,240 –> 00:19:52,240
We correct the orbit.
378
00:19:52,240 –> 00:19:55,440
To exploit a universe, you do not start at the core.
379
00:19:55,440 –> 00:19:57,880
You start by mapping the stars.
380
00:19:57,880 –> 00:19:59,720
Mapping the constellations.
381
00:19:59,720 –> 00:20:02,800
We narrow our eyes and let the light reach us.
382
00:20:02,800 –> 00:20:04,760
Reconocence is not noise.
383
00:20:04,760 –> 00:20:05,760
It is astronomy.
384
00:20:05,760 –> 00:20:07,240
We do not pound on doors.
385
00:20:07,240 –> 00:20:08,240
We read the sky.
386
00:20:08,240 –> 00:20:11,560
To begin with distant light, open ports as spectral lines.
387
00:20:11,560 –> 00:20:16,960
5388135139389455985389.
388
00:20:16,960 –> 00:20:18,680
Each reveals composition.
389
00:20:18,680 –> 00:20:19,760
DNS speaks first.
390
00:20:19,760 –> 00:20:21,440
Kerberos answers in mathematics.
391
00:20:21,440 –> 00:20:23,480
SMB hums with cargo.
392
00:20:23,480 –> 00:20:25,040
Banner hints become roles.
393
00:20:25,040 –> 00:20:27,480
Timing becomes topology.
394
00:20:27,480 –> 00:20:29,160
The map is not a picture.
395
00:20:29,160 –> 00:20:31,560
It is a probability field.
396
00:20:31,560 –> 00:20:34,280
Then we read the star charts, the directory.
397
00:20:34,280 –> 00:20:38,080
We ask careful questions with LDP and PowerShell,
398
00:20:38,080 –> 00:20:38,920
who are we?
399
00:20:38,920 –> 00:20:40,040
Which groups claim us?
400
00:20:40,040 –> 00:20:41,800
Which SPNs beckon with service?
401
00:20:41,800 –> 00:20:44,200
Which service accounts stand to tall?
402
00:20:44,200 –> 00:20:45,560
We trace edges.
403
00:20:45,560 –> 00:20:48,840
Users to groups, groups to rights, rights to sessions,
404
00:20:48,840 –> 00:20:50,680
sessions to hosts.
405
00:20:50,680 –> 00:20:53,640
A single low-privileged account becomes a beacon.
406
00:20:53,640 –> 00:20:56,360
The graph unfurls into paths.
407
00:20:56,360 –> 00:20:57,200
We do not push.
408
00:20:57,200 –> 00:21:00,360
We let gravity show the roots already carved by habit.
409
00:21:00,360 –> 00:21:02,520
Defense speaks in boundaries.
410
00:21:02,520 –> 00:21:06,600
East-West segmentation, dims, needless horizons.
411
00:21:06,600 –> 00:21:09,400
RDP gates narrow approach vectors.
412
00:21:09,400 –> 00:21:12,280
Admin contexts separate into tears
413
00:21:12,280 –> 00:21:15,000
so that noise at the edge never shakes the core.
414
00:21:15,000 –> 00:21:17,040
Least privilege reduces mass.
415
00:21:17,040 –> 00:21:19,600
Cleaning dead accounts removes debris.
416
00:21:19,600 –> 00:21:22,160
Drift detectors watch for new edges forming
417
00:21:22,160 –> 00:21:24,040
where none should exist.
418
00:21:24,040 –> 00:21:27,320
The lab echoes guide rhythm, low chime.
419
00:21:27,320 –> 00:21:29,680
Directory answers a query.
420
00:21:29,680 –> 00:21:32,360
A group we forgot still grants right.
421
00:21:32,360 –> 00:21:37,240
Base pulse, a spike in 4.769 flows to an neglected SPN.
422
00:21:37,240 –> 00:21:40,600
Soft tick, a bloodhound style path count rises,
423
00:21:40,600 –> 00:21:43,040
edges multiply, risk condenses.
424
00:21:43,040 –> 00:21:44,240
We will map.
425
00:21:44,240 –> 00:21:46,760
And when the map darkens, we will know where to land
426
00:21:46,760 –> 00:21:50,000
softly and where to refuse gravity.
427
00:21:50,000 –> 00:21:52,560
Light from distant hosts, network mapping.
428
00:21:52,560 –> 00:21:53,840
We begin a distance.
429
00:21:53,840 –> 00:21:55,200
We let photons arrive.
430
00:21:55,200 –> 00:21:56,760
We do not announce ourselves.
431
00:21:56,760 –> 00:21:58,080
We measure.
432
00:21:58,080 –> 00:22:00,160
A quiet sweep across the horizon
433
00:22:00,160 –> 00:22:06,360
reveals spectral lines, ports as elements, latency as distance,
434
00:22:06,360 –> 00:22:08,160
banners as temperature.
435
00:22:08,160 –> 00:22:17,520
53, 88, 135, 139, 389, 445, 589, 85, 3389.
436
00:22:17,520 –> 00:22:21,720
Each emission tells us what burns beneath the surface.
437
00:22:21,720 –> 00:22:23,720
DNS answers like a lighthouse.
438
00:22:23,720 –> 00:22:26,360
Kerberos replies in pure mathematics.
439
00:22:26,360 –> 00:22:28,400
RPC flickers with orchestration.
440
00:22:28,400 –> 00:22:30,280
SMB hums with cargo traffic.
441
00:22:30,280 –> 00:22:32,360
WinRM exhales management heat.
442
00:22:32,360 –> 00:22:34,160
RDP glows in the visible band.
443
00:22:34,160 –> 00:22:36,400
Most people think ports cans are noise.
444
00:22:36,400 –> 00:22:37,320
But they are wrong.
445
00:22:37,320 –> 00:22:39,480
A disciplined map is seismography.
446
00:22:39,480 –> 00:22:42,760
We sample slowly to avoid disturbing the crust.
447
00:22:42,760 –> 00:22:46,000
A handful of packets per second, randomize timing,
448
00:22:46,000 –> 00:22:48,840
varied source ports to avoid resonance.
449
00:22:48,840 –> 00:22:53,160
We read responses like star charts, open, closed, filtered.
450
00:22:53,160 –> 00:22:54,880
The pattern sketches coastline.
451
00:22:54,880 –> 00:22:57,640
The coastline reveals where gravity concentrates.
452
00:22:57,640 –> 00:23:01,120
DNS first, because navigation precedes motion.
453
00:23:01,120 –> 00:23:03,000
A real resolver answers consistently
454
00:23:03,000 –> 00:23:05,880
with authoritative edges and sane TTLs.
455
00:23:05,880 –> 00:23:10,040
A poisoned one hesitates, leaks, recursion, it should not,
456
00:23:10,040 –> 00:23:12,960
or advertises split reality without symmetry.
457
00:23:12,960 –> 00:23:16,480
We ask for SRV records and watch which domain controllers
458
00:23:16,480 –> 00:23:18,000
step into the light.
459
00:23:18,000 –> 00:23:21,560
Their responses show site topology hidden inside service
460
00:23:21,560 –> 00:23:22,720
announcements.
461
00:23:22,720 –> 00:23:25,040
Anomalies mean either drift or deception.
462
00:23:25,040 –> 00:23:26,280
Either one is curvature.
463
00:23:26,280 –> 00:23:29,280
Kerberos on 88 is not merely open or closed.
464
00:23:29,280 –> 00:23:31,960
It’s timing spreads like a Doppler shift.
465
00:23:31,960 –> 00:23:35,720
In healthy space, a KDC replies with steady cadence.
466
00:23:35,720 –> 00:23:39,480
Under strain or misplacement replies lengthened at edges.
467
00:23:39,480 –> 00:23:41,960
As if light climbing out of gravity,
468
00:23:41,960 –> 00:23:45,440
we request preauthentication for harmless principles.
469
00:23:45,440 –> 00:23:47,120
We do not break, we listen.
470
00:23:47,120 –> 00:23:49,760
If a response comes from an unexpected host,
471
00:23:49,760 –> 00:23:53,440
a trust wormhole, maybe closer than it appears.
472
00:23:53,440 –> 00:23:57,920
LDAP on 389 and 636 is the living directory surface.
473
00:23:57,920 –> 00:23:59,560
We do not enumerate yet.
474
00:23:59,560 –> 00:24:01,240
We test behavior.
475
00:24:01,240 –> 00:24:04,080
Start TLS capability announced, but never honored
476
00:24:04,080 –> 00:24:05,920
indicates misaligned law.
477
00:24:05,920 –> 00:24:08,520
Anonymous binds disabled is a good sign.
478
00:24:08,520 –> 00:24:13,920
But if a device answers as LDRP, that is not a domain controller,
479
00:24:13,920 –> 00:24:17,320
we have found a proxy moon that bends queries out of sight.
480
00:24:17,320 –> 00:24:19,160
That is a path an attacker will prefer.
481
00:24:19,160 –> 00:24:20,920
That is a path we must name.
482
00:24:20,920 –> 00:24:23,240
SMB on 445 is a supply artery.
483
00:24:23,240 –> 00:24:25,240
The handshake speaks its own dialect.
484
00:24:25,240 –> 00:24:27,200
Does it promise signing or shrug?
485
00:24:27,200 –> 00:24:29,800
Does it support dialects that should be fossils?
486
00:24:29,800 –> 00:24:32,560
Does NTLM whisper when Kerberos should sing?
487
00:24:32,560 –> 00:24:34,040
We read negotiation.
488
00:24:34,040 –> 00:24:35,480
We infer policy.
489
00:24:35,480 –> 00:24:40,280
And if we witness the printer spool is reflex on 445 or 135,
490
00:24:40,280 –> 00:24:42,680
RPC calls, that should be quiet.
491
00:24:42,680 –> 00:24:45,240
We market as title influence that can be abused
492
00:24:45,240 –> 00:24:46,840
if left near the core.
493
00:24:46,840 –> 00:24:52,040
WinRM on 5985 and 5986 is administration’s breath.
494
00:24:52,040 –> 00:24:56,240
If it answers broadly across subnet’s identity can drift quickly.
495
00:24:56,240 –> 00:24:59,240
If it is bound tightly to management enclave,
496
00:24:59,240 –> 00:25:02,360
movement will be slower, more deliberate.
497
00:25:02,360 –> 00:25:06,000
The header identifies the host’s opinion of itself,
498
00:25:06,000 –> 00:25:09,000
product versions, cypher preferences,
499
00:25:09,000 –> 00:25:13,040
the signatures of time, a cluster reveals standard images.
500
00:25:13,040 –> 00:25:17,080
Outliers betray ad hoc machines that do not share gravity.
501
00:25:17,080 –> 00:25:21,120
RDP on 33890’s elense, network level authentication
502
00:25:21,120 –> 00:25:24,520
is the glass that refuses casual fingerprints.
503
00:25:24,520 –> 00:25:27,160
Without NLA, the surface accepts touches
504
00:25:27,160 –> 00:25:29,200
from anything that finds it.
505
00:25:29,200 –> 00:25:31,640
We observe the security layer chosen,
506
00:25:31,640 –> 00:25:35,480
the certificate offered, the presence of restricted admin.
507
00:25:35,480 –> 00:25:40,520
When RDP blooms across servers that should never be touched directly,
508
00:25:40,520 –> 00:25:43,440
we know convenience has replaced law.
509
00:25:43,440 –> 00:25:45,280
Lab echo, low chime.
510
00:25:45,280 –> 00:25:48,960
Spectrum sweep complete, 1,942 hosts responded.
511
00:25:48,960 –> 00:25:53,160
Port clusters align with 3 subnets, 445 open on 71%,
512
00:25:53,160 –> 00:25:57,320
5985 open on 18%, outliers detected.
513
00:25:57,320 –> 00:26:00,400
Now defense speaks because maps demand boundaries.
514
00:26:00,400 –> 00:26:03,040
We segment east-west, not as art,
515
00:26:03,040 –> 00:26:05,880
but as physics, gravity wells in their own subnets
516
00:26:05,880 –> 00:26:09,120
with firewalls that understand identity.
517
00:26:09,120 –> 00:26:12,080
Domain controllers speak only the protocols they must.
518
00:26:12,080 –> 00:26:15,600
File servers do not accept WinRM from workstations.
519
00:26:15,600 –> 00:26:18,240
Management traffic rides corridors with gates
520
00:26:18,240 –> 00:26:20,320
that lock every crossing.
521
00:26:20,320 –> 00:26:24,160
RDP tunnels through bastions that apply multifactor as atmosphere.
522
00:26:24,160 –> 00:26:25,920
We reduce reflexes.
523
00:26:25,920 –> 00:26:31,000
SMB signing enforced, so relays cannot rewrite routes mid-flight.
524
00:26:31,000 –> 00:26:34,800
NTLMV1 retired, LM forgotten, channel binding asserted,
525
00:26:34,800 –> 00:26:37,560
so tokens cannot be stolen and worn elsewhere.
526
00:26:37,560 –> 00:26:41,480
Local administrator reuse starved by password uniqueness,
527
00:26:41,480 –> 00:26:45,520
rotation as heartbeat, laps as the metronome.
528
00:26:45,520 –> 00:26:47,840
Service accounts lose their sprawl.
529
00:26:47,840 –> 00:26:52,360
They gain least privilege orbits with constrained permissions.
530
00:26:52,360 –> 00:26:57,680
We sample again slower still, the map stabilizes, banners align,
531
00:26:57,680 –> 00:27:02,480
timing narrows, outliers remain, they always do.
532
00:27:02,480 –> 00:27:05,240
Those outliers become our next coordinates.
533
00:27:05,240 –> 00:27:08,960
Base pulse, Kerberos timing spike, two responders
534
00:27:08,960 –> 00:27:13,760
lag behind site norms, possible miscited controllers.
535
00:27:13,760 –> 00:27:17,760
Soft tick, RDP without NLA on a management subnet.
536
00:27:17,760 –> 00:27:21,840
Certificate expired, gravity slackening.
537
00:27:21,840 –> 00:27:23,480
We annotate the chart.
538
00:27:23,480 –> 00:27:25,240
We do not rush the core.
539
00:27:25,240 –> 00:27:28,880
We respect the speed of light because everything that follows,
540
00:27:28,880 –> 00:27:34,480
enumeration, privilege, theft or defense depends on this honesty.
541
00:27:34,480 –> 00:27:38,120
The sky tells the truth if we are patient, we are patient.
542
00:27:38,120 –> 00:27:42,800
Reading the star charts, AD enumeration, we turn from distant light
543
00:27:42,800 –> 00:27:44,080
to the atlas itself.
544
00:27:44,080 –> 00:27:47,000
The directory is not a list, it is a field.
545
00:27:47,000 –> 00:27:51,480
We ask questions softly, we listen for shape, we begin with identity.
546
00:27:51,480 –> 00:27:52,720
Who are we?
547
00:27:52,720 –> 00:27:55,800
The bind is a handshake with gravity.
548
00:27:55,800 –> 00:27:58,760
A simple query returns our user object.
549
00:27:58,760 –> 00:28:04,080
It’s sid the stellar coordinate, it’s UPN the constellation name.
550
00:28:04,080 –> 00:28:06,720
Group memberships follow like orbital rings.
551
00:28:06,720 –> 00:28:09,640
Global, domain local, universal.
552
00:28:09,640 –> 00:28:11,560
Scope is not cosmetic.
553
00:28:11,560 –> 00:28:15,960
Scope defines how mass transfers across borders.
554
00:28:15,960 –> 00:28:19,920
A universal group carries influence across forest space.
555
00:28:19,920 –> 00:28:23,520
A domain local concentrates power near a resource.
556
00:28:23,520 –> 00:28:25,920
We record each ring without judgment.
557
00:28:25,920 –> 00:28:27,600
Influence is cumulative.
558
00:28:27,600 –> 00:28:29,800
Paths form where rings overlap.
559
00:28:29,800 –> 00:28:30,600
We widen.
560
00:28:30,600 –> 00:28:33,200
What rights do those rings imply?
561
00:28:33,200 –> 00:28:35,120
Read on this share, write on that OU.
562
00:28:35,120 –> 00:28:36,920
Log on locally here, but not there.
563
00:28:36,920 –> 00:28:38,120
Rights are vectors.
564
00:28:38,120 –> 00:28:39,720
We map them as edges.
565
00:28:39,720 –> 00:28:42,240
Group to permission, permission to target.
566
00:28:42,240 –> 00:28:44,400
A printer operator on a quiet server
567
00:28:44,400 –> 00:28:47,960
might imply service management rights that chained carefully.
568
00:28:47,960 –> 00:28:49,880
Become local administrator elsewhere.
569
00:28:49,880 –> 00:28:50,960
We do not assume.
570
00:28:50,960 –> 00:28:51,880
We verify.
571
00:28:51,880 –> 00:28:54,520
Access paths are physics, not folklore.
572
00:28:54,520 –> 00:28:57,480
Service principle names appear like bright stars.
573
00:28:57,480 –> 00:29:02,200
HTTP finance, MSKL server 42, CFs files do too.
574
00:29:02,200 –> 00:29:05,280
Each SPN indicates a ticket can be minted for a service.
575
00:29:05,280 –> 00:29:08,200
And therefore, that credentials might be requested, cashed,
576
00:29:08,200 –> 00:29:09,640
or mishandled.
577
00:29:09,640 –> 00:29:13,120
Overprivileged service accounts burn too hot.
578
00:29:13,120 –> 00:29:17,760
If they hold domain admin or right access to sensitive OUs,
579
00:29:17,760 –> 00:29:20,560
their light distorts the map.
580
00:29:20,560 –> 00:29:24,360
We note service accounts that are trusted to delegate.
581
00:29:24,360 –> 00:29:27,760
Unconstrained delegation is a furnace.
582
00:29:27,760 –> 00:29:31,560
Constrained delegation is a lens with rules.
583
00:29:31,560 –> 00:29:34,360
Resource-based constrained delegation
584
00:29:34,360 –> 00:29:36,600
is a mirror turned inward.
585
00:29:36,600 –> 00:29:38,440
Each changes curvature.
586
00:29:38,440 –> 00:29:40,680
Each demands measurement.
587
00:29:40,680 –> 00:29:45,400
We ask for administrators, but not just the domain admins group.
588
00:29:45,400 –> 00:29:49,560
We follow the lineage, nested groups, built-ins, anomalies,
589
00:29:49,560 –> 00:29:53,280
who are CD-Bug privilege on critical servers by GPO,
590
00:29:53,280 –> 00:29:56,000
who sits in backup operators, a quiet orbit
591
00:29:56,000 –> 00:30:00,380
with tidal power over secrets, who owns the KRBTGT rotation
592
00:30:00,380 –> 00:30:00,720
ritual.
593
00:30:00,720 –> 00:30:03,440
Authorities often disguise dismaintainance.
594
00:30:03,440 –> 00:30:04,960
We surface it.
595
00:30:04,960 –> 00:30:08,360
We read the OU structure like tectonic plates.
596
00:30:08,360 –> 00:30:11,240
Teared boundaries should appear as separate continents.
597
00:30:11,240 –> 00:30:13,920
Workstations grouped apart from servers.
598
00:30:13,920 –> 00:30:15,800
DCs isolated.
599
00:30:15,800 –> 00:30:20,040
If we find a single GPO linked high that grants broad rights
600
00:30:20,040 –> 00:30:23,120
to authenticated users, the law is compromised.
601
00:30:23,120 –> 00:30:26,200
We note MTOUs with lingering links,
602
00:30:26,200 –> 00:30:28,800
the tombstones of projects, drift accumulates
603
00:30:28,800 –> 00:30:30,240
in the spaces nobody visits.
604
00:30:30,240 –> 00:30:32,640
We sample password hygiene without guessing.
605
00:30:32,640 –> 00:30:34,720
Age distributions tell a story.
606
00:30:34,720 –> 00:30:38,000
A cluster of accounts with non-expiring passwords
607
00:30:38,000 –> 00:30:42,800
forms a cold cloud, service principles, vendors, ghosts.
608
00:30:42,800 –> 00:30:44,880
Find grain password policies reveal
609
00:30:44,880 –> 00:30:48,680
where entropy improves and where tradition refuses.
610
00:30:48,680 –> 00:30:52,320
If privileged users are not bound by stricter policies,
611
00:30:52,320 –> 00:30:54,440
gravity is misallocated.
612
00:30:54,440 –> 00:30:56,760
We inspect trust objects.
613
00:30:56,760 –> 00:31:01,320
External, forest, shortcut, directionality matters.
614
00:31:01,320 –> 00:31:05,600
Selective authentication should be the gate in two-way trusts.
615
00:31:05,600 –> 00:31:09,800
Authenticated users should not pass without scrutiny.
616
00:31:09,800 –> 00:31:12,560
SID filtering disabled is a rupture
617
00:31:12,560 –> 00:31:15,880
allowing forged history to cross the wormhole.
618
00:31:15,880 –> 00:31:19,800
If any trust predates the last era of governance reviews,
619
00:31:19,800 –> 00:31:22,560
we market as an at-risk tunnel.
620
00:31:22,560 –> 00:31:25,920
We do not enumerate to collect, we enumerate to model.
621
00:31:25,920 –> 00:31:28,880
The graph takes form, uses to groups,
622
00:31:28,880 –> 00:31:33,920
groups to rights, rights to sessions, sessions to hosts.
623
00:31:33,920 –> 00:31:37,800
We add session data where we can, who is logged on where?
624
00:31:37,800 –> 00:31:40,880
Which admin has a habit of opening management tools
625
00:31:40,880 –> 00:31:42,320
from a workstation at lunch?
626
00:31:42,320 –> 00:31:43,800
Habit is gravity’s accomplice.
627
00:31:43,800 –> 00:31:46,520
A single high-value identity appearing
628
00:31:46,520 –> 00:31:50,680
on a low-trust host is a mass transfer event.
629
00:31:50,680 –> 00:31:53,560
We market with a base pulse in our minds.
630
00:31:53,560 –> 00:31:56,120
Lab echo, low chime.
631
00:31:56,120 –> 00:32:03,520
Directory responded 4,312 users, 6,981 computers,
632
00:32:03,520 –> 00:32:08,560
1,200, 4 groups, universal groups,
633
00:32:08,560 –> 00:32:13,520
37, non-expiring passwords, 112.
634
00:32:13,520 –> 00:32:16,480
We pivot to detection in the same breath.
635
00:32:16,480 –> 00:32:18,800
Enumeration should be symmetric.
636
00:32:18,800 –> 00:32:22,880
What an attacker can see, a defender, must pre-compute,
637
00:32:22,880 –> 00:32:26,000
maintain a living map of privileged paths,
638
00:32:26,000 –> 00:32:29,040
prune groups that inherited power by accident,
639
00:32:29,040 –> 00:32:33,200
retire unused SPNs, reduce delegation to necessity,
640
00:32:33,200 –> 00:32:36,400
enforce protected users for the identities that cannot fail.
641
00:32:36,400 –> 00:32:39,040
If you cannot remove NTLM entirely,
642
00:32:39,040 –> 00:32:42,240
at least ensure SMB signing and channel binding
643
00:32:42,240 –> 00:32:44,160
so the fossil cannot be weaponized.
644
00:32:44,160 –> 00:32:46,680
We set alerts on curvature, not noise,
645
00:32:46,680 –> 00:32:50,400
unusual TGS patterns for sensitive SPNs,
646
00:32:50,400 –> 00:32:54,080
event 4769 spikes outside maintenance windows,
647
00:32:54,080 –> 00:32:58,320
new admin group memberships, event 4728 and 4732
648
00:32:58,320 –> 00:33:00,160
when no cab meets.
649
00:33:00,160 –> 00:33:03,840
Directory replication access, event 4662
650
00:33:03,840 –> 00:33:06,400
with DS replication get changes
651
00:33:06,400 –> 00:33:09,120
when only backup service accounts should breathe there.
652
00:33:09,120 –> 00:33:12,640
Signment murmurs when a process reaches for LSAS.
653
00:33:12,640 –> 00:33:14,640
Event 10 with intent.
654
00:33:14,640 –> 00:33:16,240
We do not wait for collapse.
655
00:33:16,240 –> 00:33:17,920
We listen for procession.
656
00:33:17,920 –> 00:33:19,920
We close the atlas with humility.
657
00:33:19,920 –> 00:33:22,320
The directory told us where it bends.
658
00:33:22,320 –> 00:33:25,120
Our task is to remove mass where we can,
659
00:33:25,120 –> 00:33:27,040
add fences where we must,
660
00:33:27,040 –> 00:33:30,080
and instrument the sky so drift becomes sound.
661
00:33:30,080 –> 00:33:33,360
Base pulse, the next orbit begins.
662
00:33:33,360 –> 00:33:35,680
Scripted segment, you walk the graph,
663
00:33:35,680 –> 00:33:37,760
you begin with a dim credential,
664
00:33:37,760 –> 00:33:40,000
a regular user, no symbols of power,
665
00:33:40,000 –> 00:33:42,000
a single SD a drift.
666
00:33:42,000 –> 00:33:44,560
You ask softly, who am I?
667
00:33:44,560 –> 00:33:47,280
The directory replies with minimal mass,
668
00:33:47,280 –> 00:33:49,280
one user object, a primary group,
669
00:33:49,280 –> 00:33:52,080
a few nested rings, home folder, mailbox,
670
00:33:52,080 –> 00:33:54,560
nothing that glows, the silence feels safe,
671
00:33:54,560 –> 00:33:56,480
but time has its own opinion.
672
00:33:56,480 –> 00:34:00,560
You widen the lens, who trusts the groups that trust me?
673
00:34:00,560 –> 00:34:03,840
Edge’s form, a departmental group appears,
674
00:34:03,840 –> 00:34:07,360
granted read on a file share where scripts accumulate.
675
00:34:07,360 –> 00:34:12,320
A quiet comet labeled deploy holds a plain text credential
676
00:34:12,320 –> 00:34:14,800
meant to speed a midnight fix.
677
00:34:14,800 –> 00:34:17,440
The credential belongs to a service account,
678
00:34:17,440 –> 00:34:19,840
low chime, directory speaks,
679
00:34:19,840 –> 00:34:22,960
service account, interactive logon permitted,
680
00:34:22,960 –> 00:34:28,560
logon service, MGMT02 APP07.
681
00:34:28,560 –> 00:34:30,240
The gravity sharpens,
682
00:34:30,240 –> 00:34:33,280
that service account carries local administrator
683
00:34:33,280 –> 00:34:35,120
on three neighboring hosts.
684
00:34:35,120 –> 00:34:38,400
Convenience enacted during a crisis never revoked.
685
00:34:38,400 –> 00:34:42,000
You step onto MGMT02, not by force,
686
00:34:42,000 –> 00:34:45,360
but by invitation already written into ACLs.
687
00:34:45,360 –> 00:34:47,200
On its service sessions glitter,
688
00:34:47,200 –> 00:34:49,360
one belongs to a backup operator
689
00:34:49,360 –> 00:34:52,160
who once ran a restore and kept the habit.
690
00:34:53,120 –> 00:34:56,800
Base pulse, Sysman whispers, event 10,
691
00:34:56,800 –> 00:35:01,200
process seeking LSS, handled denied by policy.
692
00:35:01,200 –> 00:35:04,080
The shield holds today, but the pattern is visible.
693
00:35:04,080 –> 00:35:06,960
You do not smash, you listen.
694
00:35:06,960 –> 00:35:09,920
You follow the orbit labeled backup operators.
695
00:35:09,920 –> 00:35:17,360
In Windows, that orbit tides secrets.
696
00:35:17,360 –> 00:35:21,600
It can load drivers, read volumes,
697
00:35:22,240 –> 00:35:25,200
copy the registry hives that remember.
698
00:35:25,200 –> 00:35:28,000
A short path appears, backup operator
699
00:35:28,000 –> 00:35:31,520
to registry to cached secrets to lateral movement
700
00:35:31,520 –> 00:35:33,280
under the guise of maintenance.
701
00:35:33,280 –> 00:35:35,440
The universe suggests you confirm.
702
00:35:35,440 –> 00:35:37,600
You trace SPNs like Brightstars,
703
00:35:37,600 –> 00:35:42,720
MSSQL, Ledger01, CISS, Sharecore,
704
00:35:42,720 –> 00:35:44,800
HTTP Finance.
705
00:35:44,800 –> 00:35:48,000
Tickets are passports, requests leave trails,
706
00:35:48,000 –> 00:35:53,280
event 4769 clusters for HTTP Finance at hours when finance sleeps.
707
00:35:53,280 –> 00:35:56,320
That means service access where service should dream.
708
00:35:56,320 –> 00:35:59,680
Either automation went feral or someone borrowed the light.
709
00:35:59,680 –> 00:36:00,960
You market.
710
00:36:00,960 –> 00:36:06,560
Soft tick, telemetry murmurs, edges 182 paths to DA found.
711
00:36:06,560 –> 00:36:09,120
The graph is not a threat, it is a weather report.
712
00:36:09,120 –> 00:36:11,360
You pivot from services to delegation.
713
00:36:11,360 –> 00:36:14,640
Unconstrained is heat, constrained is engineered light.
714
00:36:14,640 –> 00:36:17,280
Resource-based is a mirror with rules.
715
00:36:17,280 –> 00:36:20,080
You see an aging application server trusted for
716
00:36:20,080 –> 00:36:22,160
unconstrained delegation.
717
00:36:22,160 –> 00:36:24,880
It received its blessing when the vendor promised no risk.
718
00:36:24,880 –> 00:36:30,320
It kept it when the vendor forgot that server can hold TGTs for those who visit.
719
00:36:30,320 –> 00:36:33,600
Administrators once visited to debug an outage.
720
00:36:33,600 –> 00:36:36,080
They’re tokens orbited within memory.
721
00:36:36,080 –> 00:36:40,320
You note the curvature, if the furnace is breached, it emits passports.
722
00:36:40,320 –> 00:36:43,360
Not a zero-day, a zero-care low-chime,
723
00:36:43,360 –> 00:36:48,960
directory replies to a controlled query, krbtgt password last set,
724
00:36:48,960 –> 00:36:50,960
two thousand to eighty one days ago,
725
00:36:50,960 –> 00:36:52,240
starlight from the past.
726
00:36:52,240 –> 00:36:55,680
If someone minted a ticket forged from yesterday’s secret,
727
00:36:55,680 –> 00:36:58,480
the present might still accept it as fate.
728
00:36:58,480 –> 00:37:02,960
You mark the ritual overdue, reset twice, measured and verified.
729
00:37:02,960 –> 00:37:08,320
You walk the trust objects one external, one shortcut, one forest.
730
00:37:08,320 –> 00:37:12,160
Selective authentication disabled on the shortcut
731
00:37:12,160 –> 00:37:13,840
that spans convenience.
732
00:37:13,840 –> 00:37:16,720
SCD filtering relaxed for a vendor era
733
00:37:16,720 –> 00:37:19,840
that ended two reorganizations ago.
734
00:37:19,840 –> 00:37:24,560
The wormhole remains open, passing history across without friction.
735
00:37:24,560 –> 00:37:26,000
You write a note in gravity.
736
00:37:26,000 –> 00:37:28,880
If collapse begins, it will begin here.
737
00:37:28,880 –> 00:37:32,160
You lean into habit because habit is the true credential.
738
00:37:32,160 –> 00:37:37,120
Session data shows a domain admin touching a management server at lunch
739
00:37:37,120 –> 00:37:39,840
from a workstation that should be tier two.
740
00:37:39,840 –> 00:37:41,440
One appearance can be an accident.
741
00:37:42,160 –> 00:37:45,520
Three is ritual that ritual creates mass transfer.
742
00:37:45,520 –> 00:37:49,440
A high-value token arrives where low-value processes breathe.
743
00:37:49,440 –> 00:37:51,680
Even with defenses, the curvature is wrong.
744
00:37:51,680 –> 00:37:52,720
You do not accuse.
745
00:37:52,720 –> 00:37:53,840
You annotate.
746
00:37:53,840 –> 00:37:58,000
Then you plan to remove every reason for that ritual to exist.
747
00:37:58,000 –> 00:37:59,440
Base pulse.
748
00:37:59,440 –> 00:38:02,000
A bloodhound style path highlights.
749
00:38:02,000 –> 00:38:02,880
User.
750
00:38:02,880 –> 00:38:04,320
Department group.
751
00:38:04,320 –> 00:38:06,400
Write to script share.
752
00:38:06,400 –> 00:38:08,080
Service credential.
753
00:38:08,080 –> 00:38:09,840
Local admin chain.
754
00:38:09,840 –> 00:38:11,280
Management server.
755
00:38:11,280 –> 00:38:12,720
Cash ticket.
756
00:38:12,720 –> 00:38:14,800
DC adjacent reach.
757
00:38:14,800 –> 00:38:15,760
No lockpicked.
758
00:38:15,760 –> 00:38:16,960
No door broken.
759
00:38:16,960 –> 00:38:18,320
Gravity did the work.
760
00:38:18,320 –> 00:38:21,360
You close the loop with defense pronounced in the language of physics.
761
00:38:21,360 –> 00:38:23,200
Reduce edges.
762
00:38:23,200 –> 00:38:23,760
Remove.
763
00:38:23,760 –> 00:38:26,320
Write from the script share for humans who only read.
764
00:38:26,320 –> 00:38:28,800
Rotate the service credential.
765
00:38:28,800 –> 00:38:30,400
Binded to least privilege.
766
00:38:30,400 –> 00:38:31,680
Deny interactive.
767
00:38:31,680 –> 00:38:32,400
Logon.
768
00:38:32,400 –> 00:38:34,480
And audit where it breathes.
769
00:38:34,480 –> 00:38:38,320
Enforce labs to sever shared local admin constellations.
770
00:38:38,320 –> 00:38:42,320
Push SMB signing so relays cannot bend roots.
771
00:38:42,320 –> 00:38:44,480
Retire the unconstrained furnace.
772
00:38:44,480 –> 00:38:49,920
Replace it with resource-based constrained delegation tied to exact services not a hope.
773
00:38:49,920 –> 00:38:52,160
Reset KRBTGT twice.
774
00:38:52,160 –> 00:38:53,520
Seal tier behind pause.
775
00:38:53,520 –> 00:38:55,600
Train habit with gates not scolding.
776
00:38:55,600 –> 00:38:57,040
The directory does not hide.
777
00:38:57,040 –> 00:38:58,560
It whispers.
778
00:38:58,560 –> 00:39:00,720
Enumeration is not a threat.
779
00:39:00,720 –> 00:39:05,040
It is a confession the system makes to anyone patient enough to hear it.
780
00:39:05,040 –> 00:39:09,600
And once you know the paths you do not need to move loudly you just fall.
781
00:39:09,600 –> 00:39:11,040
Pull breaking orbits.
782
00:39:11,040 –> 00:39:12,960
We arrive at a single endpoint.
783
00:39:12,960 –> 00:39:16,480
The place where ordinary work becomes extraordinary leverage.
784
00:39:16,480 –> 00:39:19,200
A compromised workstation is not a breach.
785
00:39:19,200 –> 00:39:20,640
It is a launch pad.
786
00:39:20,640 –> 00:39:22,560
Local privilege is thrust.
787
00:39:22,560 –> 00:39:24,400
Credential material is fuel.
788
00:39:24,400 –> 00:39:25,920
Lateral movement is trajectory.
789
00:39:25,920 –> 00:39:29,120
We break orbits in three gravitational moves.
790
00:39:29,120 –> 00:39:31,120
First, the local climb.
791
00:39:31,120 –> 00:39:34,640
Services with weak permissions.
792
00:39:34,640 –> 00:39:35,920
Unquoted paths.
793
00:39:35,920 –> 00:39:38,000
Access rights.
794
00:39:38,000 –> 00:39:42,320
In quiet groups like backup operators or print operators.
795
00:39:42,320 –> 00:39:46,400
We do not need names or vulnerabilities to know the pattern.
796
00:39:46,400 –> 00:39:49,040
Misconfiguration accelerates mass.
797
00:39:49,040 –> 00:39:51,760
Second, we read memories heat.
798
00:39:51,760 –> 00:39:53,120
LSAS is the key ring.
799
00:39:53,120 –> 00:39:55,840
SSPs are the dialects.
800
00:39:55,840 –> 00:39:57,920
Tickets and hashes are condensed power.
801
00:39:57,920 –> 00:40:00,560
If W digest sleeves we let it sleep.
802
00:40:00,560 –> 00:40:02,800
If LSA protection stands we honor it.
803
00:40:02,800 –> 00:40:06,720
If the shield is missing attackers will ask the key ring to sing.
804
00:40:06,720 –> 00:40:08,320
We answer by hardening.
805
00:40:08,320 –> 00:40:11,040
Credential guard run SPPL.
806
00:40:11,040 –> 00:40:12,240
Restricted debug.
807
00:40:12,240 –> 00:40:14,960
No admin sessions on untrusted hosts.
808
00:40:14,960 –> 00:40:17,280
Third, we respect times verdict.
809
00:40:17,280 –> 00:40:21,920
A server from 2016 that never learned new laws is a pocket where time dilates.
810
00:40:21,920 –> 00:40:23,280
Patches do not arrive.
811
00:40:23,280 –> 00:40:24,640
Protocols remain generous.
812
00:40:24,640 –> 00:40:26,640
That machine bends the field around it.
813
00:40:26,640 –> 00:40:28,240
We isolate or retire.
814
00:40:28,240 –> 00:40:31,840
Or we compensate with walls and watches.
815
00:40:31,840 –> 00:40:32,960
Low chime.
816
00:40:32,960 –> 00:40:35,680
Elevation attempt blocked by service DA CL.
817
00:40:35,680 –> 00:40:36,720
Base pulse.
818
00:40:36,720 –> 00:40:38,560
Sysment event 10 denied.
819
00:40:38,560 –> 00:40:40,480
The fabric speaks when we let it.
820
00:40:40,480 –> 00:40:43,760
Everything changes when the initial thrust meets structure.
821
00:40:43,760 –> 00:40:46,160
If the edges are many movement is easy.
822
00:40:46,160 –> 00:40:48,480
If the edges are few movement is noisy.
823
00:40:48,480 –> 00:40:51,120
In the next segments we will climb.
824
00:40:51,120 –> 00:40:53,200
We will attempt to read memory.
825
00:40:53,200 –> 00:40:56,720
And we will decide whether the orbit breaks or holds.
826
00:40:56,720 –> 00:40:58,640
The next orbit begins.
827
00:40:58,640 –> 00:41:00,720
From user to local admin.
828
00:41:00,720 –> 00:41:03,360
We stand on a workstation surface.
829
00:41:03,360 –> 00:41:04,240
Ordinary gravity.
830
00:41:04,240 –> 00:41:05,440
Ordinary permissions.
831
00:41:05,440 –> 00:41:07,440
A user clicks, types, saves.
832
00:41:07,440 –> 00:41:08,640
Nothing blazes.
833
00:41:08,640 –> 00:41:10,400
But local privilege is not a crown.
834
00:41:10,400 –> 00:41:11,840
It is momentum.
835
00:41:11,840 –> 00:41:15,200
And momentum comes from frictionless paths carved long ago.
836
00:41:15,200 –> 00:41:17,680
We look for the first slope.
837
00:41:17,680 –> 00:41:18,880
Services.
838
00:41:18,880 –> 00:41:23,520
In windows, a service is an engine strapped to the hull.
839
00:41:23,520 –> 00:41:27,760
If its binary path contains spaces and lacks quotes,
840
00:41:27,760 –> 00:41:30,000
the system resolves greedily.
841
00:41:30,000 –> 00:41:32,080
Stopping at the first executable fragment.
842
00:41:32,080 –> 00:41:33,840
That is an unquoted service path.
843
00:41:33,840 –> 00:41:37,600
If a low-privileged user can write into that directory,
844
00:41:37,600 –> 00:41:40,480
they can slide a payload into the resolution.
845
00:41:40,480 –> 00:41:42,880
On next start, the engine burns the wrong fuel.
846
00:41:42,880 –> 00:41:44,800
Elevation without ceremony.
847
00:41:44,800 –> 00:41:45,760
We do not guess.
848
00:41:45,760 –> 00:41:46,800
We measure.
849
00:41:46,800 –> 00:41:51,040
Service configuration is a map of intent meeting file system truth.
850
00:41:51,040 –> 00:41:52,640
Then we test the bolts.
851
00:41:52,640 –> 00:41:54,080
Service permissions.
852
00:41:54,080 –> 00:41:56,720
A service with a generous DACl
853
00:41:56,720 –> 00:42:02,240
lets ordinary users change its binary, its start mode, or its account.
854
00:42:02,240 –> 00:42:05,040
When that happens, gravity is inverted.
855
00:42:05,040 –> 00:42:09,840
A quiet user can rewire a trusted engine to run their code as local system.
856
00:42:09,840 –> 00:42:11,760
Not a zero-day.
857
00:42:11,760 –> 00:42:14,000
A zero-discipline in DACLs.
858
00:42:14,000 –> 00:42:16,000
The defense lives where it began.
859
00:42:16,000 –> 00:42:19,840
Correct ACLs on services and their binaries.
860
00:42:19,840 –> 00:42:22,480
Configuration, drift detectors.
861
00:42:22,480 –> 00:42:24,800
That shout when a startup path changes.
862
00:42:24,800 –> 00:42:28,880
And a rule that services run under least privileged accounts
863
00:42:28,880 –> 00:42:31,120
with right protected binaries.
864
00:42:31,120 –> 00:42:35,360
We examine the local constellations, groups, backup operators,
865
00:42:35,360 –> 00:42:39,200
print operators, power users that survived an earlier era.
866
00:42:39,200 –> 00:42:42,880
These rings look harmless because they are not administrators by name.
867
00:42:42,880 –> 00:42:44,560
But Windows remembers history.
868
00:42:44,560 –> 00:42:48,400
Backup operators can load drivers, read volumes,
869
00:42:48,400 –> 00:42:52,320
and touch the registry hives where secrets congeal.
870
00:42:52,320 –> 00:42:56,400
Print operators can manage services and drivers that run in elevated space.
871
00:42:56,400 –> 00:43:00,480
One misapplied membership bestows title influence.
872
00:43:00,480 –> 00:43:03,040
We cut these rings to purpose.
873
00:43:03,040 –> 00:43:07,280
Memberships are documented, justified, time-bound,
874
00:43:07,280 –> 00:43:10,400
and reviewed on a cadence that feels like ritual.
875
00:43:10,400 –> 00:43:11,680
Lab Echo.
876
00:43:11,680 –> 00:43:12,400
Low chime.
877
00:43:12,400 –> 00:43:15,200
Service query returned.
878
00:43:15,200 –> 00:43:16,960
Three vulnerable paths.
879
00:43:16,960 –> 00:43:20,880
Right access detected in C-program files vendor appils,
880
00:43:20,880 –> 00:43:27,280
Base Pulse. Service DACL allows start, stop, change,
881
00:43:27,280 –> 00:43:30,000
config for authenticated users.
882
00:43:30,000 –> 00:43:33,840
The fabric speaks, we answer.
883
00:43:33,840 –> 00:43:38,000
Now known vulnerabilities without naming them.
884
00:43:38,000 –> 00:43:40,800
Privilege escalation is a pattern.
885
00:43:40,800 –> 00:43:43,040
Unsigned drivers accepted without scrutiny.
886
00:43:43,040 –> 00:43:46,480
Scheduled tasks with world-rightable actions.
887
00:43:47,120 –> 00:43:52,480
High jackable, DLL search orders when a process looks in a right-able directory first.
888
00:43:52,480 –> 00:43:56,240
The specific identifier changes with season.
889
00:43:56,240 –> 00:43:57,840
The physics remains.
890
00:43:57,840 –> 00:44:01,920
A high-privilege process trusts a low-privilege location.
891
00:44:01,920 –> 00:44:05,520
Our counterforces mechanical, block unsigned kernel code,
892
00:44:05,520 –> 00:44:11,840
Restrict who can load drivers, monitor new scheduled tasks with administrative principles,
893
00:44:11,840 –> 00:44:16,480
and fix search paths so binaries and DLLs come from read-only
894
00:44:16,480 –> 00:44:17,360
constellations.
895
00:44:17,360 –> 00:44:23,760
We step into the registry and file system looking for right-able edges near the core.
896
00:44:23,760 –> 00:44:30,560
If program files, system 32 siblings, or service directories allow non-admin rights,
897
00:44:30,560 –> 00:44:32,160
the hull is already thin.
898
00:44:32,160 –> 00:44:38,000
We set inheritance to sanity, audit for explicit grants that deviate from baselines,
899
00:44:38,000 –> 00:44:41,920
and stamp golden images so mispermissions cannot replicate like spores.
900
00:44:41,920 –> 00:44:44,080
We read habit because habit bends everything.
901
00:44:44,080 –> 00:44:50,400
Developers installed compilers and debuggers on servers for a quick fix and never removed them.
902
00:44:50,400 –> 00:44:52,560
Those tools are not evil, they are leverage.
903
00:44:52,560 –> 00:44:58,640
On a workstation, a local user with a compiler and a right-able service path
904
00:44:58,640 –> 00:45:02,560
can manufacture their ladder the moment curiosity arrives.
905
00:45:02,560 –> 00:45:03,600
We dry that fuel.
906
00:45:03,600 –> 00:45:10,240
No compilers on servers, no ad hoc tool caches in privileged directories,
907
00:45:10,240 –> 00:45:14,560
application control to require signatures and publishers we trust.
908
00:45:14,560 –> 00:45:17,520
Credential material is nearby but we hold the line.
909
00:45:17,520 –> 00:45:20,080
Local admin is a gate before memory.
910
00:45:20,080 –> 00:45:24,480
If the local administrator password is shared across machines,
911
00:45:24,480 –> 00:45:27,360
pass the hash turns one gate into many.
912
00:45:27,360 –> 00:45:31,440
We sever that constellation with labs or an equivalent rotation ritual.
913
00:45:31,440 –> 00:45:35,360
Unique secrets per host, rotation as heartbeat,
914
00:45:35,360 –> 00:45:39,760
audit as astronomy, who use the local admin account from where,
915
00:45:39,760 –> 00:45:40,400
and why.
916
00:45:40,400 –> 00:45:43,840
We cast the baseline as law, not suggestion.
917
00:45:43,840 –> 00:45:48,880
CIS and Microsoft security baselines are not paperwork.
918
00:45:48,880 –> 00:45:51,040
They are orbital parameters.
919
00:45:51,040 –> 00:45:56,480
They harden services, disable legacy reflexes, constrain rights.
920
00:45:56,480 –> 00:45:57,920
We do not paste them blindly.
921
00:45:57,920 –> 00:45:59,680
We test them in force then watch.
922
00:45:59,680 –> 00:46:04,640
Drift detectors compare current state to intended gravity
923
00:46:04,640 –> 00:46:07,200
and speak when the difference grows.
924
00:46:07,200 –> 00:46:12,000
We rehearse hygiene, regularly scan for local privilege escalation patterns,
925
00:46:12,000 –> 00:46:14,960
not to collect trophies but to delete the slopes.
926
00:46:14,960 –> 00:46:17,120
Patch cadence becomes a metronome.
927
00:46:17,120 –> 00:46:21,680
Servers and workstations learn new laws promptly.
928
00:46:21,680 –> 00:46:27,440
When legacy software resists, we isolate it behind walls and watches,
929
00:46:27,440 –> 00:46:28,560
or we retire it.
930
00:46:28,560 –> 00:46:31,200
Isolation is not punishment.
931
00:46:31,200 –> 00:46:33,760
It is respect for physics we cannot change.
932
00:46:33,760 –> 00:46:34,480
Lab echo.
933
00:46:34,480 –> 00:46:35,680
Soft tick.
934
00:46:36,480 –> 00:46:39,600
Local group membership audit backup operators contains
935
00:46:39,600 –> 00:46:43,120
SVC backup 01 and user J Sato.
936
00:46:43,120 –> 00:46:44,400
That name matters.
937
00:46:44,400 –> 00:46:45,840
Humans make systems bend.
938
00:46:45,840 –> 00:46:48,160
We remove what is not justified.
939
00:46:48,160 –> 00:46:50,080
We time bound what remains.
940
00:46:50,080 –> 00:46:53,120
We alert when gravity returns without approval.
941
00:46:53,120 –> 00:46:54,880
We close with a principle.
942
00:46:54,880 –> 00:46:58,640
Local admin should be rare, reversible, and recent.
943
00:46:58,640 –> 00:46:59,360
Rare.
944
00:46:59,360 –> 00:47:01,600
Because most tasks do not need it.
945
00:47:01,600 –> 00:47:05,040
Reversible because just in time rights expire.
946
00:47:05,040 –> 00:47:10,480
Recent because standing privilege decays into habit and habit into breach.
947
00:47:10,480 –> 00:47:12,880
GA for power shell.
948
00:47:12,880 –> 00:47:14,880
Temporary elevation with approvals.
949
00:47:14,880 –> 00:47:16,880
Session recording where law permits.
950
00:47:16,880 –> 00:47:19,600
Appeal for the hands that must touch servers.
951
00:47:19,600 –> 00:47:21,600
And a boundary.
952
00:47:21,600 –> 00:47:24,640
No administrative hands on untrusted hosts ever.
953
00:47:24,640 –> 00:47:26,640
Low chime.
954
00:47:26,640 –> 00:47:28,560
Elevation attempt thwarted.
955
00:47:28,560 –> 00:47:30,320
Change service config denied.
956
00:47:30,320 –> 00:47:32,800
Base pulse fades.
957
00:47:32,800 –> 00:47:34,240
The orbit holds.
958
00:47:34,240 –> 00:47:35,280
Reading memory.
959
00:47:35,280 –> 00:47:37,280
LSAS and the key ring.
960
00:47:37,280 –> 00:47:40,960
We descend into the chamber where identity condenses into metal.
961
00:47:40,960 –> 00:47:43,280
The local security authority is not a process.
962
00:47:43,280 –> 00:47:44,640
It is the key ring.
963
00:47:44,640 –> 00:47:47,440
In its memory, live the proofs we trade for access.
964
00:47:47,440 –> 00:47:49,200
Kerberos tickets.
965
00:47:49,200 –> 00:47:50,720
N-T-L-M secrets.
966
00:47:50,720 –> 00:47:51,920
Cash tokens.
967
00:47:51,920 –> 00:47:53,760
And the structures that bind them.
968
00:47:53,760 –> 00:47:57,120
The security support providers that speak the dialects of trust.
969
00:47:57,120 –> 00:48:00,160
Power BI does not simply show us.
970
00:48:00,160 –> 00:48:02,800
LSAS enforces who we are allowed to become.
971
00:48:03,360 –> 00:48:05,920
When it is naked, gravity fails.
972
00:48:05,920 –> 00:48:07,840
Kerberos breathes here.
973
00:48:07,840 –> 00:48:12,480
Ticket granting tickets once minted by the KDC rest as heat.
974
00:48:12,480 –> 00:48:14,880
Renewable within policy.
975
00:48:14,880 –> 00:48:18,320
Convertible into service tickets without asking passwords again.
976
00:48:18,320 –> 00:48:22,560
N-T-L-M persists as a fossil dialect.
977
00:48:22,560 –> 00:48:28,320
If policy permits, challenge responses and cashed secrets remain within reach.
978
00:48:28,320 –> 00:48:31,040
The credential manager keeps convenience close.
979
00:48:31,760 –> 00:48:32,880
Saved web creds.
980
00:48:32,880 –> 00:48:34,320
Mapped drive tokens.
981
00:48:34,320 –> 00:48:36,160
Enterprise SSO recidios.
982
00:48:36,160 –> 00:48:37,520
Each convenience is mass.
983
00:48:37,520 –> 00:48:41,360
Each mass can be moved if rules allow hands to near the ring.
984
00:48:41,360 –> 00:48:44,880
Security support providers are the translators.
985
00:48:44,880 –> 00:48:45,760
Kerberos.
986
00:48:45,760 –> 00:48:46,720
N-T-L-M.
987
00:48:46,720 –> 00:48:47,760
Negotiate.
988
00:48:47,760 –> 00:48:48,880
Cred SSP.
989
00:48:48,880 –> 00:48:50,160
Amid others.
990
00:48:50,160 –> 00:48:52,560
They register within LSAS.
991
00:48:52,560 –> 00:48:55,040
So logons and delegations have a voice.
992
00:48:55,040 –> 00:49:00,960
When legacy SSP is linger, when W. Digest is enabled for compatibility.
993
00:49:00,960 –> 00:49:05,920
When third party providers install with generous hooks, memory becomes a market.
994
00:49:05,920 –> 00:49:07,920
Opponents do not need passwords.
995
00:49:07,920 –> 00:49:09,120
They need handles.
996
00:49:09,120 –> 00:49:11,040
A read is enough to become you.
997
00:49:11,040 –> 00:49:13,200
This is why shield patterns matter.
998
00:49:13,200 –> 00:49:17,840
LSA protection run SPPL hardens LSAS into a protected process.
999
00:49:17,840 –> 00:49:22,480
When enforced, only signed, trusted, specifically permitted code
1000
00:49:22,480 –> 00:49:25,200
can request the handles that reveal secrets.
1001
00:49:25,200 –> 00:49:30,320
Without it, any process with CD-Bug privilege or clever in direction
1002
00:49:30,320 –> 00:49:32,480
can ask the key ring to sing.
1003
00:49:32,480 –> 00:49:38,400
Credential guard isolates long-lived secrets within virtualization boundaries.
1004
00:49:38,400 –> 00:49:43,200
LSAS becomes a mediator rather than a vault with an open door.
1005
00:49:43,200 –> 00:49:45,120
The difference is gravitational.
1006
00:49:45,120 –> 00:49:48,320
With shields, read attempts, bend and break.
1007
00:49:48,320 –> 00:49:51,440
Without shields, time dilates in secrets leak.
1008
00:49:51,440 –> 00:49:52,240
Low chime.
1009
00:49:52,240 –> 00:49:55,360
Sizement event 10 handles requests to LSAS from Windward.
1010
00:49:55,360 –> 00:49:56,080
X-C.
1011
00:49:56,080 –> 00:49:57,600
Access denied by PPL.
1012
00:49:58,160 –> 00:50:00,880
That is the sound of a shield absorbing a particle.
1013
00:50:00,880 –> 00:50:02,400
The base pulse recedes.
1014
00:50:02,400 –> 00:50:07,520
But time has its own opinion on a legacy host where LSA protection is not present
1015
00:50:07,520 –> 00:50:12,320
or where W-digest was once toggled for a vendor never reversed.
1016
00:50:12,320 –> 00:50:16,720
Memory contains clear text that should never have existed.
1017
00:50:16,720 –> 00:50:20,560
If administrators log on interactively to that host,
1018
00:50:20,560 –> 00:50:25,440
high-value tokens orbit within the same gravity as untrusted processes.
1019
00:50:25,440 –> 00:50:27,920
A tool does not need to be exotic.
1020
00:50:27,920 –> 00:50:29,680
It needs to be adjacent.
1021
00:50:29,680 –> 00:50:32,720
The path is physics, obtain local admin,
1022
00:50:32,720 –> 00:50:38,000
request handles, read memory, serialize secrets, move sideways.
1023
00:50:38,000 –> 00:50:40,320
We counter with ritual and boundaries.
1024
00:50:40,320 –> 00:50:42,880
First, remove the fuel.
1025
00:50:42,880 –> 00:50:48,560
Disable W-digest by policy and verify the registry aligns with intent.
1026
00:50:48,560 –> 00:50:55,760
Deny interactive logon to service accounts and tier identities on anything but privileged
1027
00:50:55,760 –> 00:51:02,480
access workstations require restricted admin for RDP into service where possible.
1028
00:51:02,480 –> 00:51:05,680
So reusable credentials do not land.
1029
00:51:05,680 –> 00:51:09,440
Block process injection tools and unsigned drivers.
1030
00:51:09,440 –> 00:51:11,120
The kernel is the last sky.
1031
00:51:11,120 –> 00:51:14,080
Do not let it accept foreign stars.
1032
00:51:14,080 –> 00:51:16,480
Second, constrain proximity.
1033
00:51:16,480 –> 00:51:18,560
Isolate admin sessions.
1034
00:51:18,560 –> 00:51:22,960
The hands that hold domain power must never touch untrusted terrain.
1035
00:51:22,960 –> 00:51:26,480
If an admin must fix a workstation, the tool reaches in.
1036
00:51:26,480 –> 00:51:28,240
The admin does not step out.
1037
00:51:28,240 –> 00:51:31,600
Just enough administration defines the verbs.
1038
00:51:31,600 –> 00:51:34,000
Just in time grants the time window.
1039
00:51:34,000 –> 00:51:36,960
Session recording captures the light trail.
1040
00:51:36,960 –> 00:51:38,400
The goal is not surveillance.
1041
00:51:38,400 –> 00:51:40,400
It is physics.
1042
00:51:40,400 –> 00:51:44,480
Prevent high mass tokens from descending into low-trust wells.
1043
00:51:44,480 –> 00:51:46,480
Third, instrument memory.
1044
00:51:46,480 –> 00:51:52,640
Sysmon event 10 alerts when a process asks for LSAS with suspicious intent.
1045
00:51:52,640 –> 00:51:55,680
Parit with event 1 to map parentage.
1046
00:51:55,680 –> 00:51:58,560
Office apps should not birth credential readers.
1047
00:51:58,560 –> 00:52:01,760
Add event 7 for image loads.
1048
00:52:01,760 –> 00:52:09,840
When an unexpected SSP DLL wedges into LSAS, the sky has been altered.
1049
00:52:09,840 –> 00:52:12,560
Windows security logs add context.
1050
00:52:12,560 –> 00:52:17,680
4 6 24 logons that bring admin SIDs into places they should not be.
1051
00:52:17,680 –> 00:52:22,000
46 7 2 privileges assigned where maintenance is not scheduled.
1052
00:52:22,000 –> 00:52:22,960
Correlate.
1053
00:52:22,960 –> 00:52:25,920
Curvature emerges only when lines intersect.
1054
00:52:25,920 –> 00:52:27,280
Lab echo.
1055
00:52:27,280 –> 00:52:28,480
Soft tick.
1056
00:52:28,480 –> 00:52:31,040
Security 4624.
1057
00:52:31,040 –> 00:52:36,160
Logon type 10 to server core app 03 by admin SVC deploy.
1058
00:52:36,160 –> 00:52:37,840
Baseballs.
1059
00:52:37,840 –> 00:52:39,120
Sysmon 7.
1060
00:52:39,120 –> 00:52:40,800
New SSP module loaded.
1061
00:52:40,800 –> 00:52:42,000
Legacy digest.
1062
00:52:42,000 –> 00:52:43,200
Elton.
1063
00:52:43,200 –> 00:52:44,560
The fabric shutters.
1064
00:52:44,560 –> 00:52:46,160
This is not an exploit.
1065
00:52:46,160 –> 00:52:48,400
This is permission granted by neglect.
1066
00:52:48,400 –> 00:52:50,480
Credential guard is a boundary in time.
1067
00:52:50,480 –> 00:52:55,760
Where supported enable it, it does not make theft impossible but it raises the energy required.
1068
00:52:55,760 –> 00:53:00,080
Hashes and TGT material move behind virtualization.
1069
00:53:00,080 –> 00:53:03,360
Pass the hash becomes an exercise in frustration.
1070
00:53:03,360 –> 00:53:04,960
Ticket diffusion slows.
1071
00:53:04,960 –> 00:53:08,960
Parit with protected users for critical identities.
1072
00:53:08,960 –> 00:53:11,280
So NTLM usage is refused.
1073
00:53:11,280 –> 00:53:17,280
TGT lifetimes shorten and delegation declines unless explicitly permitted.
1074
00:53:17,280 –> 00:53:18,960
Now we revisit habit.
1075
00:53:19,600 –> 00:53:26,400
If developers or operators run browsers, email or chat on servers, cookies and tokens collect
1076
00:53:26,400 –> 00:53:29,520
near LSAS, like dust around a magnet.
1077
00:53:29,520 –> 00:53:35,280
Web SSO credentials escape the intended sphere and offer federated power where only local
1078
00:53:35,280 –> 00:53:36,800
control should exist.
1079
00:53:36,800 –> 00:53:38,400
Remove browsers from service.
1080
00:53:38,400 –> 00:53:45,680
Force administrative work through PRbues with hardened profiles, no personal apps and policies
1081
00:53:45,680 –> 00:53:47,120
that starve convenience.
1082
00:53:47,120 –> 00:53:50,320
We also revisit error handling as a signal.
1083
00:53:50,320 –> 00:53:55,520
When an attacker attempts to read LSAS and fails because run SPPL stands,
1084
00:53:55,520 –> 00:53:57,840
do not celebrate silently.
1085
00:53:57,840 –> 00:53:58,640
Alert.
1086
00:53:58,640 –> 00:54:01,760
Investigate the process tree, user and source.
1087
00:54:01,760 –> 00:54:06,560
False positives exist but physics does not produce noise without cause.
1088
00:54:06,560 –> 00:54:11,040
Either security product probe legitimately or a tool searched for doors.
1089
00:54:11,040 –> 00:54:12,800
Tune then trust the pattern.
1090
00:54:12,800 –> 00:54:16,240
Defense sounds like law but it behaves like orbit.
1091
00:54:16,240 –> 00:54:23,200
Apply the MS and CIS baselines that set LSA protection, credential guard and SSP hygiene.
1092
00:54:23,200 –> 00:54:31,120
Remove legacy providers, enforce driver signing, deny CD-Bug privilege to every account that does
1093
00:54:31,120 –> 00:54:33,040
not bear it by necessity.
1094
00:54:33,040 –> 00:54:38,640
If an application demands exceptions, isolate it behind walls and watchers and schedule
1095
00:54:38,640 –> 00:54:52,560
its eradication like decommissioning a collapsing star, low chime.
1096
00:54:52,560 –> 00:54:54,880
Not a fountain, we are sent.
1097
00:54:54,880 –> 00:54:58,080
Memory still holds heat but it is arranged.
1098
00:54:58,080 –> 00:55:01,760
Identity bends but within boundaries we did not remove gravity.
1099
00:55:01,760 –> 00:55:03,680
We taught it restrained.
1100
00:55:03,680 –> 00:55:07,600
Time dilation patches and technical debt.
1101
00:55:07,600 –> 00:55:10,640
Time does not pass evenly in an enterprise.
1102
00:55:10,640 –> 00:55:12,160
It stretches around legacy.
1103
00:55:12,160 –> 00:55:13,920
It compresses around urgency.
1104
00:55:13,920 –> 00:55:19,760
A 2016 server that never learned new laws does not sit in the present.
1105
00:55:19,760 –> 00:55:22,240
It drags the present backward.
1106
00:55:22,240 –> 00:55:23,440
That is time dilation.
1107
00:55:23,440 –> 00:55:26,320
The longer we allow it the heavier it becomes.
1108
00:55:26,320 –> 00:55:27,920
Technical debt is not a bill.
1109
00:55:27,920 –> 00:55:29,240
It is gravity.
1110
00:55:29,240 –> 00:55:35,360
Each exception adds mass, a postponed reboot, a deferred cumulative update, a driver pinned
1111
00:55:35,360 –> 00:55:41,000
to an older kernel, a vendor requirement that demanded temporary registry edits.
1112
00:55:41,000 –> 00:55:42,320
Individually they seem trivial.
1113
00:55:42,320 –> 00:55:49,760
Together they warp authentication, alter negotiation and open paths attackers do not have to force.
1114
00:55:49,760 –> 00:55:52,200
They merely step where time slowed.
1115
00:55:52,200 –> 00:55:58,240
Consider the stack, a domain member with outdated patches still advertises NTLM behaviors
1116
00:55:58,240 –> 00:55:59,760
we thought retired.
1117
00:55:59,760 –> 00:56:03,280
Channel binding never enabled SMB signing optional.
1118
00:56:03,280 –> 00:56:07,320
RPC endpoints exposing methods with weak verification.
1119
00:56:07,320 –> 00:56:10,240
None of this requires an exploit in the cinematic sense.
1120
00:56:10,240 –> 00:56:17,040
It requires only the courage to ask in the dialect that machine still understands.
1121
00:56:17,040 –> 00:56:22,400
And when privileged humans visit when an admin RDPs in just for a quick look, their fresh
1122
00:56:22,400 –> 00:56:25,400
tokens orbit an old gravity.
1123
00:56:25,400 –> 00:56:28,200
That is how the past steals the present.
1124
00:56:28,200 –> 00:56:29,480
Low chime.
1125
00:56:29,480 –> 00:56:33,440
Update baseline drift 47 servers behind by 90 plus days.
1126
00:56:33,440 –> 00:56:37,440
Three domain controllers outside secure channel patch cadence.
1127
00:56:37,440 –> 00:56:39,040
Base pulse.
1128
00:56:39,040 –> 00:56:44,480
Event 4769 anomalies correlate with unpatched SPN hosts.
1129
00:56:44,480 –> 00:56:46,320
The fabric reports the obvious.
1130
00:56:46,320 –> 00:56:47,600
Time is not neutral.
1131
00:56:47,600 –> 00:56:49,280
We push back with ritual.
1132
00:56:49,280 –> 00:56:52,440
Patch cadence is the metronome that resets physics.
1133
00:56:52,440 –> 00:56:55,480
It is not a heroic sprint every quarter.
1134
00:56:55,480 –> 00:56:57,040
It is a drumbeat.
1135
00:56:57,040 –> 00:56:58,720
Reliation on day.
1136
00:56:58,720 –> 00:57:00,840
Lab validation by day two.
1137
00:57:00,840 –> 00:57:02,240
Pilot by day seven.
1138
00:57:02,240 –> 00:57:04,640
Broad deployment by day 14.
1139
00:57:04,640 –> 00:57:06,800
Exceptions documented with a sunset.
1140
00:57:06,800 –> 00:57:12,120
Out of band fixes for identity and remote execution are emergencies.
1141
00:57:12,120 –> 00:57:14,720
Not negotiable calendar items.
1142
00:57:14,720 –> 00:57:18,360
We do not wait for change windows to align with fate.
1143
00:57:18,360 –> 00:57:21,440
We shape windows to respect gravity.
1144
00:57:21,440 –> 00:57:24,000
But time has its own opinion about reality.
1145
00:57:24,000 –> 00:57:26,440
Some systems cannot move fast.
1146
00:57:26,440 –> 00:57:29,360
Real controllers that hang on brittle drivers.
1147
00:57:29,360 –> 00:57:34,760
Line of business servers with vendors who treat updates as existential threats.
1148
00:57:34,760 –> 00:57:37,120
Here we choose one of three paths.
1149
00:57:37,120 –> 00:57:38,120
Retire.
1150
00:57:38,120 –> 00:57:40,720
Decommission where business allows.
1151
00:57:40,720 –> 00:57:44,160
Because dead mass cannot bend the future.
1152
00:57:44,160 –> 00:57:45,720
Isolate.
1153
00:57:45,720 –> 00:57:48,840
Quarantine behind identity aware firewalls.
1154
00:57:48,840 –> 00:57:54,720
Deny inbound administration except through bastions and restrict egress so a compromised
1155
00:57:54,720 –> 00:57:57,200
legacy box cannot shout.
1156
00:57:57,200 –> 00:57:58,400
Compensate.
1157
00:57:58,400 –> 00:58:00,600
Enforce SMB signing.
1158
00:58:00,600 –> 00:58:03,760
Force TLS 1.2 plus.
1159
00:58:03,760 –> 00:58:05,240
Enable Sysmon.
1160
00:58:05,240 –> 00:58:07,160
Deploy application control.
1161
00:58:07,160 –> 00:58:11,920
And wrap the host with monitoring that treats any privilege expansion as a siren.
1162
00:58:11,920 –> 00:58:13,640
We document as gravity.
1163
00:58:13,640 –> 00:58:14,960
Not guilt.
1164
00:58:14,960 –> 00:58:16,760
A risk register is not theatre.
1165
00:58:16,760 –> 00:58:19,240
It is a map of where time runs slow.
1166
00:58:19,240 –> 00:58:21,920
Each entry lists controls applied.
1167
00:58:21,920 –> 00:58:25,760
These allowed in a date when the star must go dark.
1168
00:58:25,760 –> 00:58:27,440
Leadership does not fear schedules.
1169
00:58:27,440 –> 00:58:29,080
They fear surprises.
1170
00:58:29,080 –> 00:58:32,000
Show them orbit decay in plain numbers.
1171
00:58:32,000 –> 00:58:33,000
Patch age.
1172
00:58:33,000 –> 00:58:34,760
Event correlations.
1173
00:58:34,760 –> 00:58:37,000
Lateral attempts blocked by policy.
1174
00:58:37,000 –> 00:58:39,920
Provide cost to stabilize versus cost to ignore.
1175
00:58:39,920 –> 00:58:41,960
The universe still wants to be understood.
1176
00:58:41,960 –> 00:58:42,960
So does a budget.
1177
00:58:42,960 –> 00:58:45,360
We defend identity against old clocks.
1178
00:58:45,360 –> 00:58:51,160
KRBT GT rotation twice per cycle ensures that even if a golden ticket was forged in
1179
00:58:51,160 –> 00:58:55,920
a prior age, it loses power when the secrets change.
1180
00:58:55,920 –> 00:59:02,480
Enforce protected users for critical admins so their sessions refuse NTLM and delegation
1181
00:59:02,480 –> 00:59:05,880
even on older hosts that try to tempt them.
1182
00:59:05,880 –> 00:59:12,200
Require RDP restricted admin and PAWs so credentials never cross into unpatched memory.
1183
00:59:12,200 –> 00:59:13,760
Telemetry must speak intense.
1184
00:59:13,760 –> 00:59:17,720
Not merely what happened but what happened on a clock that lags.
1185
00:59:17,720 –> 00:59:23,760
Having hosts by Patch cohort correlate event 4768 and 4769 spikes with cohort labels.
1186
00:59:23,760 –> 00:59:28,800
If older cohorts correlate with anomalies, you have proof of curvature.
1187
00:59:28,800 –> 00:59:33,920
Sysmon events from outdated kernels deserve higher suspicion scores.
1188
00:59:33,920 –> 00:59:40,160
A login to a legacy print server by a tier identity should be a page, not a report.
1189
00:59:40,160 –> 00:59:41,160
Lab echo.
1190
00:59:41,160 –> 00:59:42,160
Soft tick.
1191
00:59:42,160 –> 00:59:48,680
cohort report patch cohort C emits 61% of suspicious LSS handle attempts.
1192
00:59:48,680 –> 00:59:51,080
cohort A emits 5%.
1193
00:59:51,080 –> 00:59:52,480
The numbers are not drama.
1194
00:59:52,480 –> 00:59:54,200
They are gravity made audible.
1195
00:59:54,200 –> 00:59:59,640
We fix drift by making time visible dashboards that show patch velocity by business owner.
1196
00:59:59,640 –> 01:00:05,840
SLA agreements that treat identity patches as production uptime because they are.
1197
01:00:05,840 –> 01:00:07,920
Change boards that understand the physics.
1198
01:00:07,920 –> 01:00:13,440
A weekend outage to update KDCs prevents a week long outage after collapse.
1199
01:00:13,440 –> 01:00:19,580
Tabletop exercises that stage a domain controller compromise and walk leadership through forest
1200
01:00:19,580 –> 01:00:20,580
recovery.
1201
01:00:20,580 –> 01:00:23,000
Practice turns fear into competence.
1202
01:00:23,000 –> 01:00:27,080
Finally we change habit, exceptions expire by default.
1203
01:00:27,080 –> 01:00:32,080
Service accounts receive maintenance windows to rotate secrets like tides.
1204
01:00:32,080 –> 01:00:37,000
GPOs enforce modern protocols and refuse to be moved except by ceremony.
1205
01:00:37,000 –> 01:00:41,800
We teach a culture that sees temporary as a threat, not a favor.
1206
01:00:41,800 –> 01:00:43,440
Low chime.
1207
01:00:43,440 –> 01:00:44,920
Legacy exception closed.
1208
01:00:44,920 –> 01:00:47,280
Bass pulse diminishes.
1209
01:00:47,280 –> 01:00:49,120
Time resumes its proper pace.
1210
01:00:49,120 –> 01:00:51,200
We do not chase every patch as panic.
1211
01:00:51,200 –> 01:00:52,160
We set a rhythm.
1212
01:00:52,160 –> 01:00:53,480
We honor it.
1213
01:00:53,480 –> 01:00:58,640
And when an old star refuses, we either put it behind glass or watch it collapse on our
1214
01:00:58,640 –> 01:01:00,480
terms, not the universe’s.
1215
01:01:00,480 –> 01:01:03,200
The next orbit begins at the center.
1216
01:01:03,200 –> 01:01:09,880
For gravity wells and trusts in every windows universe there is a mass at the center.
1217
01:01:09,880 –> 01:01:12,320
The domain controller.
1218
01:01:12,320 –> 01:01:14,120
Authentication curves around it.
1219
01:01:14,120 –> 01:01:15,560
Authorization descends from it.
1220
01:01:15,560 –> 01:01:18,880
Kerberos and NTLM are the languages its gravity speaks.
1221
01:01:18,880 –> 01:01:24,960
Trusts are wormholes that connect galaxies to one another for convenience or catastrophe.
1222
01:01:24,960 –> 01:01:28,320
We will read Kerberos as curved space.
1223
01:01:28,320 –> 01:01:31,160
KDC to TGT to TGS.
1224
01:01:31,160 –> 01:01:34,680
SPNs as stars that tickets orbit.
1225
01:01:34,680 –> 01:01:37,760
Delegation as lenses that bend identity.
1226
01:01:37,760 –> 01:01:41,080
Unconstrained delegation is a furnace.
1227
01:01:41,080 –> 01:01:44,240
Constrained delegation is engineered light.
1228
01:01:44,240 –> 01:01:47,640
Resource-based constrained delegation is a mirror with rules.
1229
01:01:47,640 –> 01:01:49,280
Each changes curvature.
1230
01:01:49,280 –> 01:01:51,320
Each must be chosen, not inherited.
1231
01:01:51,320 –> 01:01:53,960
We will treat NTLM as fossil gravity.
1232
01:01:53,960 –> 01:01:55,840
Useful in rare caves.
1233
01:01:55,840 –> 01:01:57,920
Dangerous in open sky.
1234
01:01:57,920 –> 01:01:59,760
Relays exploit unsigned lanes.
1235
01:01:59,760 –> 01:02:02,040
To dialects betray modern intent.
1236
01:02:02,040 –> 01:02:03,360
We do not shame legacy.
1237
01:02:03,360 –> 01:02:04,880
We confine it.
1238
01:02:04,880 –> 01:02:06,720
Trusts will be our wormholes.
1239
01:02:06,720 –> 01:02:09,400
Forest external shortcut.
1240
01:02:09,400 –> 01:02:12,360
Directionality selective authentication.
1241
01:02:12,360 –> 01:02:14,480
SID filtering.
1242
01:02:14,480 –> 01:02:16,240
Stable when designed.
1243
01:02:16,240 –> 01:02:18,400
Treacherous when forgotten.
1244
01:02:18,400 –> 01:02:21,760
We will harden gates and monitor crossings.
1245
01:02:21,760 –> 01:02:22,760
Low chime.
1246
01:02:22,760 –> 01:02:25,280
Event 4769 Drift clusters near finance.
1247
01:02:25,280 –> 01:02:26,280
SPNs.
1248
01:02:26,280 –> 01:02:27,960
Base pulse.
1249
01:02:27,960 –> 01:02:31,400
Unusual TGT lifetimes detected.
1250
01:02:31,400 –> 01:02:34,880
We listened because the fabric speaks before it tears.
1251
01:02:34,880 –> 01:02:36,200
We descend now.
1252
01:02:36,200 –> 01:02:37,800
Toward the well.
1253
01:02:37,800 –> 01:02:39,520
Kerberos as curved space.
1254
01:02:39,520 –> 01:02:40,960
Kerberos is not a handshake.
1255
01:02:40,960 –> 01:02:42,760
It is geometry.
1256
01:02:42,760 –> 01:02:44,960
Identity bends across a field.
1257
01:02:44,960 –> 01:02:47,600
And the KDC defines the curvature.
1258
01:02:47,600 –> 01:02:49,520
We begin at the singularity.
1259
01:02:49,520 –> 01:02:51,680
The key distribution center.
1260
01:02:51,680 –> 01:02:54,800
Living inside each domain controller.
1261
01:02:54,800 –> 01:02:58,840
When you authenticate, you do not receive permission.
1262
01:02:58,840 –> 01:03:00,760
You receive potential.
1263
01:03:00,760 –> 01:03:02,800
Your ticket granting ticket.
1264
01:03:02,800 –> 01:03:05,040
The TGT is a compact star.
1265
01:03:05,040 –> 01:03:12,800
It holds your SID, group SIDs, a lifetime flags, and a signature sealed by the KRBTGT secret
1266
01:03:12,800 –> 01:03:15,160
that only the KDC can wield.
1267
01:03:15,160 –> 01:03:19,000
To every other service, that seal is invisible.
1268
01:03:19,000 –> 01:03:22,320
To the KDC it is truth spoken in mathematics.
1269
01:03:22,320 –> 01:03:24,680
With the TGT you request light.
1270
01:03:24,680 –> 01:03:29,480
These tickets, TGS, are photons bent toward a destination.
1271
01:03:29,480 –> 01:03:36,920
You ask for SIFS on a file server, MSSQL on a ledger box, HTTP on a finance app.
1272
01:03:36,920 –> 01:03:44,400
The KDC examines your TGT’s contents, consults policy, and mince a service ticket encrypted
1273
01:03:44,400 –> 01:03:47,000
with the service’s long term key.
1274
01:03:47,000 –> 01:03:49,720
The server cannot read your TGT.
1275
01:03:49,720 –> 01:03:52,520
It reads only what the KDC wrote for it.
1276
01:03:52,520 –> 01:03:54,040
This is the first law.
1277
01:03:54,040 –> 01:03:57,680
Services trust the KDC’s memory of you, not your word.
1278
01:03:57,680 –> 01:03:59,880
Service principle names mark the stars.
1279
01:03:59,880 –> 01:04:06,360
HTTP finance, MSSQL ledger 01, CFS, Share Core.
1280
01:04:06,360 –> 01:04:09,440
Each SPN is a coordinate where tickets can land.
1281
01:04:09,440 –> 01:04:13,080
When SPN’s point at accounts with broad power, the gravity distorts.
1282
01:04:13,080 –> 01:04:19,240
A service account with right rights to sensitive OUs or membership in high groups turns routine
1283
01:04:19,240 –> 01:04:23,160
access into a lens that magnifies risk.
1284
01:04:23,160 –> 01:04:29,720
We prune SPN’s constrained rights and name OUs because unnamed light becomes heat.
1285
01:04:29,720 –> 01:04:32,880
Delegation is how identity passes through lenses.
1286
01:04:32,880 –> 01:04:35,760
Unconstrained delegation is a furnace.
1287
01:04:35,760 –> 01:04:41,080
The service receives your ticket and may request tickets to anything on your behalf.
1288
01:04:41,080 –> 01:04:46,480
If a privileged user touches that furnace, their TGT may rest in memory, convertible into
1289
01:04:46,480 –> 01:04:48,800
access across the universe.
1290
01:04:48,800 –> 01:04:52,800
Constrained delegation is engineered light.
1291
01:04:52,800 –> 01:04:59,360
The service can act for you only toward designated SPN’s.
1292
01:04:59,360 –> 01:05:04,120
Resource-based constrained delegation reverses the perspective.
1293
01:05:04,120 –> 01:05:07,400
The target service declares who may impersonate to it.
1294
01:05:07,400 –> 01:05:11,880
Each mode defines how far identity can travel without consulting you again.
1295
01:05:11,880 –> 01:05:13,960
Choose care over convenience.
1296
01:05:13,960 –> 01:05:15,280
Lab echo.
1297
01:05:15,280 –> 01:05:16,800
Low chime.
1298
01:05:16,800 –> 01:05:18,800
TGS issuance spike.
1299
01:05:18,800 –> 01:05:22,680
HTTP finance outside change window.
1300
01:05:22,680 –> 01:05:23,840
Base pulse.
1301
01:05:23,840 –> 01:05:25,560
Delegation path discovered.
1302
01:05:25,560 –> 01:05:28,960
App-old has unconstrained trust.
1303
01:05:28,960 –> 01:05:30,960
Um…
1304
01:05:30,960 –> 01:05:32,640
The…
1305
01:05:32,640 –> 01:05:35,520
The field ripples before it tears.
1306
01:05:35,520 –> 01:05:37,800
Attackers do not break curboros.
1307
01:05:37,800 –> 01:05:40,320
They harvest what drift permits.
1308
01:05:40,320 –> 01:05:46,320
If SPN’s are owned by accounts with weak passwords, requesting their service tickets produces
1309
01:05:46,320 –> 01:05:49,680
ciphertext eligible for offline guessing.
1310
01:05:49,680 –> 01:05:51,760
We do not describe the ritual.
1311
01:05:51,760 –> 01:05:53,880
We correct the physics.
1312
01:05:53,880 –> 01:05:59,040
Privileged service accounts must use long random secrets and where possible managed service
1313
01:05:59,040 –> 01:06:02,240
accounts that rotate by design.
1314
01:06:02,240 –> 01:06:08,840
Monitor event for 769 patterns that spike for sensitive SPNs, especially from principles
1315
01:06:08,840 –> 01:06:10,920
that historically never asked.
1316
01:06:10,920 –> 01:06:13,200
Abuse of delegation follows curvature.
1317
01:06:13,200 –> 01:06:16,560
An unconstrained server becomes a token magnet.
1318
01:06:16,560 –> 01:06:21,920
An attacker who obtains local admin there can read the furnace and convert visiting administrators
1319
01:06:21,920 –> 01:06:23,200
into passports.
1320
01:06:23,200 –> 01:06:28,040
We cool the surface, remove unconstrained delegation from anything but edge relays that
1321
01:06:28,040 –> 01:06:34,600
terminate in isolation, use constraint delegation with protocol transition, only were audited,
1322
01:06:34,600 –> 01:06:40,720
and favor resource-based constrained delegation to PIN who may speak for whom.
1323
01:06:40,720 –> 01:06:46,600
We deny interactive logon to service accounts so human heat never bays the furnace.
1324
01:06:46,600 –> 01:06:48,480
The care BTGT secret is time.
1325
01:06:48,480 –> 01:06:55,160
If it goes stale, forged TGTs from a past era may still be honored by controllers that
1326
01:06:55,160 –> 01:06:57,200
never learned the new song.
1327
01:06:57,200 –> 01:07:02,400
We reset care BTGT twice in a controlled window with replication observed tickets allowed
1328
01:07:02,400 –> 01:07:04,440
to age out between rotations.
1329
01:07:04,440 –> 01:07:06,800
This is a ritual not a reaction.
1330
01:07:06,800 –> 01:07:10,520
When a forest trembles, we perform it again after eviction.
1331
01:07:10,520 –> 01:07:15,200
Pack data, authorization claims inside tickets carries group memberships and privileges
1332
01:07:15,200 –> 01:07:17,480
signed by the KDC.
1333
01:07:17,480 –> 01:07:23,800
Services that validate pack signatures ask the KDC to confirm the seal when uncertain.
1334
01:07:23,800 –> 01:07:27,920
When validation is lax injected claims masquerade as truth.
1335
01:07:27,920 –> 01:07:33,960
Enable pack signature validation for sensitive services and log failures like gravitational
1336
01:07:33,960 –> 01:07:35,200
anomalies.
1337
01:07:35,200 –> 01:07:39,760
When a service claims a user belongs to a group they never joined the sky is lying.
1338
01:07:39,760 –> 01:07:46,080
Some remains the quiet tyrant, Kerberos lifetimes, skew tolerance and renewal windows define
1339
01:07:46,080 –> 01:07:48,520
how long-light persists.
1340
01:07:48,520 –> 01:07:52,640
Short lifetimes reduce the window for ticket theft to matter.
1341
01:07:52,640 –> 01:07:55,760
Accessively short lifetimes induce thrash.
1342
01:07:55,760 –> 01:07:58,840
Accessively long lifetimes tolerate drift.
1343
01:07:58,840 –> 01:08:02,880
Critical identities benefit from stricter horizons.
1344
01:08:02,880 –> 01:08:07,240
Protected users limit delegation and reduce lifetime.
1345
01:08:07,240 –> 01:08:13,080
Start with MFA at interactive entry so TGT minting itself costs energy.
1346
01:08:13,080 –> 01:08:15,800
Trusts stretch Kerberos across galaxies.
1347
01:08:15,800 –> 01:08:23,040
When domains or forests trust, TGTs cross wormholes through referral tickets.
1348
01:08:23,040 –> 01:08:29,080
Selective authentication ensures only named entities may be trusted on the far side.
1349
01:08:29,080 –> 01:08:33,720
Without it, authenticated users drift where they never belonged.
1350
01:08:33,720 –> 01:08:37,800
CD filtering cuts forged history at the border.
1351
01:08:37,800 –> 01:08:41,840
Disabled filtering lets the past impersonate the present.
1352
01:08:41,840 –> 01:08:44,360
We anchor wormholes with gates.
1353
01:08:44,360 –> 01:08:46,840
Selective authentication on two way trusts.
1354
01:08:46,840 –> 01:08:53,280
SD filtering enabled and monitoring for interforest ticket flows that do not match business schedule.
1355
01:08:53,280 –> 01:08:55,760
Lab Echo Soft Tick.
1356
01:08:55,760 –> 01:08:57,520
Event 4768.
1357
01:08:57,520 –> 01:09:01,680
Unusual pre-auth failures from a management subnet.
1358
01:09:01,680 –> 01:09:02,840
Low chime.
1359
01:09:02,840 –> 01:09:05,760
Unusual pre-auth failures from a management subnet.
1360
01:09:05,760 –> 01:09:08,760
Unusual pre-auth failures from a management subnet.
1361
01:09:08,760 –> 01:09:11,720
Unusual pre-auth failures from a management subnet.
1362
01:09:11,720 –> 01:09:14,320
Unusual pre-auth failures from a management subnet.
1363
01:09:14,320 –> 01:09:17,480
Unusual pre-auth failures from a management subnet.
1364
01:09:17,480 –> 01:09:20,560
Unusual pre-auth failures from a management subnet.
1365
01:09:20,560 –> 01:09:23,520
Unusual pre-auth failures from a management subnet.
1366
01:09:23,520 –> 01:09:26,480
Unusual pre-auth failures from a management subnet.
1367
01:09:26,480 –> 01:09:29,480
Unusual pre-auth failures from a management subnet.
1368
01:09:29,480 –> 01:09:32,480
Unusual pre-auth failures from a management subnet.
1369
01:09:32,480 –> 01:09:35,400
Unusual pre-auth failures from a management subnet.
1370
01:09:35,400 –> 01:09:38,400
Unusual pre-auth failures from a management subnet.
1371
01:09:38,400 –> 01:09:40,400
Unusual pre-auth failures from a management subnet.
1372
01:09:40,400 –> 01:09:42,400
Unusual pre-auth failures from a management subnet.
1373
01:09:42,400 –> 01:09:44,400
Unusual pre-auth failures from a management subnet.
1374
01:09:44,400 –> 01:09:45,400
Unusual pre-auth failures from a management subnet.
1375
01:09:45,400 –> 01:09:46,400
Unusual pre-auth failures from a management subnet.
1376
01:09:46,400 –> 01:09:47,400
Unusual pre-auth failures from a management subnet.
1377
01:09:47,400 –> 01:09:48,400
Unusual pre-auth failures from a management subnet.
1378
01:09:48,400 –> 01:09:49,400
Unusual pre-auth failures from a management subnet.
1379
01:09:49,400 –> 01:09:50,400
Unusual pre-auth failures from a management subnet.
1380
01:09:50,400 –> 01:09:51,400
Unusual pre-auth failures from a management subnet.
1381
01:09:51,400 –> 01:09:52,400
Unusual pre-auth failures from a management subnet.
1382
01:09:52,400 –> 01:09:53,400
Unusual pre-auth failures from a management subnet.
1383
01:09:53,400 –> 01:10:08,400
N-T-L-M is not evil.
1384
01:10:08,400 –> 01:10:09,400
It is ancient.
1385
01:10:09,400 –> 01:10:14,400
A dialect from a colder era preserved in sediment and convenience.
1386
01:10:14,400 –> 01:10:17,320
When the enterprise forgets, it exists.
1387
01:10:17,320 –> 01:10:18,920
It does not vanish.
1388
01:10:18,920 –> 01:10:20,120
It waits.
1389
01:10:20,120 –> 01:10:21,440
Fossils do not chase us.
1390
01:10:21,440 –> 01:10:22,680
We step on them.
1391
01:10:22,680 –> 01:10:26,840
N-T-L-M speaks challenge and responds not tickets and curvature.
1392
01:10:26,840 –> 01:10:29,200
There is no KDC to seal memory.
1393
01:10:29,200 –> 01:10:33,360
There is only a server asking for proof and a client offering a computation.
1394
01:10:33,360 –> 01:10:40,560
Without signing, without binding, the conversation can be stolen mid-sentence and replayed elsewhere.
1395
01:10:40,560 –> 01:10:46,840
With weak variants, L-M and N-T-L-MV1, the math yields to guessing in hours, sometimes
1396
01:10:46,840 –> 01:10:48,160
minutes.
1397
01:10:48,160 –> 01:10:53,120
Even modern N-T-L-MV2, when unguarded, will reflect through relays and grant what it never
1398
01:10:53,120 –> 01:10:54,880
meant to grant.
1399
01:10:54,880 –> 01:10:56,240
Relays are not magic.
1400
01:10:56,240 –> 01:10:58,120
They are gravity exploiting a slope.
1401
01:10:58,120 –> 01:11:01,600
A victim tries to authenticate to a hostile middle.
1402
01:11:01,600 –> 01:11:06,840
The middle carries the challenge faithfully to a real server, returns the response and wins
1403
01:11:06,840 –> 01:11:08,440
a session it never earned.
1404
01:11:08,440 –> 01:11:10,200
No passwords captured.
1405
01:11:10,200 –> 01:11:12,080
No hashes cracked.
1406
01:11:12,080 –> 01:11:17,280
Only a trust misplaced between two points that did not verify each other.
1407
01:11:17,280 –> 01:11:21,880
N-S-M-B signing is optional when L-D-A-P channel binding sleeps.
1408
01:11:21,880 –> 01:11:26,720
When HTTP neglects mutual TLS, the slope is slick.
1409
01:11:26,720 –> 01:11:28,800
Lab echo, low chime.
1410
01:11:28,800 –> 01:11:31,040
4.769 remains quiet.
1411
01:11:31,040 –> 01:11:33,080
4.776 flickers.
1412
01:11:33,080 –> 01:11:37,000
N-T-L-M authentication to file archive from unknown host.
1413
01:11:37,000 –> 01:11:38,000
Base pulse.
1414
01:11:38,000 –> 01:11:40,960
S-M-B signing, not required.
1415
01:11:40,960 –> 01:11:43,200
The fossil hums beneath modern stone.
1416
01:11:43,200 –> 01:11:48,280
Why does N-T-L-M persist? because some caves never saw light, devices and services that
1417
01:11:48,280 –> 01:11:55,320
cannot speak Kerberos, mixed realms, legacy appliances, stubborn printers that demand a handshake
1418
01:11:55,320 –> 01:11:57,280
older than your governance.
1419
01:11:57,280 –> 01:12:02,840
It also persists because humans visit those caves with privileged tokens.
1420
01:12:02,840 –> 01:12:07,360
When a domain admin touches a legacy share, the fossil is invited to dinner.
1421
01:12:07,360 –> 01:12:09,160
The attacker does not have to cook.
1422
01:12:09,160 –> 01:12:10,760
They serve.
1423
01:12:10,760 –> 01:12:13,000
Defense begins with renunciation.
1424
01:12:13,000 –> 01:12:16,480
Disable L-M and N-T-L-MV-1 outright.
1425
01:12:16,480 –> 01:12:19,640
There is no business case worthy of geologic weakness.
1426
01:12:19,640 –> 01:12:26,000
Race the N-T-L-M audit level to measure where it still flows, then apply policy to refuse
1427
01:12:26,000 –> 01:12:29,440
it where possible, confine it where necessary.
1428
01:12:29,440 –> 01:12:34,760
In domains that cannot yet retire it, define allow lists for service permitted to accept
1429
01:12:34,760 –> 01:12:38,760
N-T-L-M and make every other service answer with silence.
1430
01:12:38,760 –> 01:12:45,180
Then add friction to the slope and force SMB signing on clients and servers so relays
1431
01:12:45,180 –> 01:12:48,680
cannot convince the far side they are near.
1432
01:12:48,680 –> 01:12:54,160
Enable extended protection and channel binding for L-D-A-P over TLS so the client’s proof
1433
01:12:54,160 –> 01:12:59,980
is tied to the service certificate and imposter cannot reuse it elsewhere, where Webstacks
1434
01:12:59,980 –> 01:13:06,800
live, prefer Kerberos with SPNs and constrain fallback.
1435
01:13:06,800 –> 01:13:13,320
N-T-L-M must remain, require mutual TLS so at least the tunnel refuses strangers.
1436
01:13:13,320 –> 01:13:19,520
We align identity with purpose protected users for critical accounts, prevents N-T-L-M use
1437
01:13:19,520 –> 01:13:21,000
entirely.
1438
01:13:21,000 –> 01:13:24,920
Those identities will not speak fossil dialects.
1439
01:13:24,920 –> 01:13:30,760
Administrative actions move through powers that deny N-T-L-M at the OS and network layers.
1440
01:13:30,760 –> 01:13:35,600
Service accounts retire bare passwords for managed service accounts or Kerberos only
1441
01:13:35,600 –> 01:13:42,200
bindings, where N-T-L-M is demanded we quarantine those services in subnets that do not touch
1442
01:13:42,200 –> 01:13:44,480
tier.
1443
01:13:44,480 –> 01:13:51,080
Trusts across forests adopt selective authentication so N-T-L-M sessions do not drift across wormholes
1444
01:13:51,080 –> 01:13:52,080
uninspected.
1445
01:13:52,080 –> 01:13:53,560
Lab Echo.
1446
01:13:53,560 –> 01:13:55,160
Soft tick.
1447
01:13:55,160 –> 01:14:00,040
Group policy enforced, Microsoft network client, digitally signed communications, always
1448
01:14:00,040 –> 01:14:01,360
enabled.
1449
01:14:01,360 –> 01:14:07,160
Low chime, L-D-A-P channel binding required, the sediment begins to harden.
1450
01:14:07,160 –> 01:14:11,040
Detection must treat N-T-L-M as seismic activity.
1451
01:14:11,040 –> 01:14:16,880
4776 shows N-T-L-M authentication attempts cluster by source to find relays.
1452
01:14:16,880 –> 01:14:22,760
4624 with Logon Type 3 from unusual intermediaries betrays man in the middle.
1453
01:14:22,760 –> 01:14:24,400
4648.
1454
01:14:24,400 –> 01:14:30,000
Logon with explicit credentials, without a corresponding Kerberos path, suggests fossil
1455
01:14:30,000 –> 01:14:31,000
pressure.
1456
01:14:31,000 –> 01:14:37,000
Paired with Sysmon event 3 for SMB sessions between hosts that should never converse.
1457
01:14:37,000 –> 01:14:42,720
At 514 share accesses that appear from jump hosts outside maintenance windows.
1458
01:14:42,720 –> 01:14:43,720
Build correlation.
1459
01:14:43,720 –> 01:14:52,880
N-T-L-M, where Kerberos should rule, SMB without signing, L-D-I-P binds without channel binding.
1460
01:14:52,880 –> 01:14:56,480
Curvature emerges in combinations, not single stars.
1461
01:14:56,480 –> 01:15:01,760
We must name the printers too, the spoolers reflexes long been a tide for relays and coercion,
1462
01:15:01,760 –> 01:15:04,840
on servers that are not print servers disable the spooler.
1463
01:15:04,840 –> 01:15:10,040
On those that must print, isolate, patch aggressively, and monitor for outbound authentication
1464
01:15:10,040 –> 01:15:11,040
bursts.
1465
01:15:11,040 –> 01:15:14,640
Convenience is not worth an ocean current that touches tier.
1466
01:15:14,640 –> 01:15:16,440
Time participates.
1467
01:15:16,440 –> 01:15:22,480
Old applications can be modernized if we assign owners, budgets and sunsets.
1468
01:15:22,480 –> 01:15:24,920
Isolation is not exile, it is mercy.
1469
01:15:24,920 –> 01:15:31,280
Philans with deny by default, firewall rules that allow only application ports, no inbound
1470
01:15:31,280 –> 01:15:37,600
admin except via bastions that refuse N-T-L-M, compensate with telemetry.
1471
01:15:37,600 –> 01:15:44,080
Sysmon on, command line capture, driver load audits, kernel protections enforced.
1472
01:15:44,080 –> 01:15:48,120
Every N-T-L-M allowance must be louder than Kerberos by design.
1473
01:15:48,120 –> 01:15:53,360
Lab echo, base pulse, attempted SMB relay blocked, signing required, source.
1474
01:15:53,360 –> 01:16:06,320
10.23.7.41, target, file, archive, low chime, 4776 surge reduced 83% after policy rollout.
1475
01:16:06,320 –> 01:16:09,680
Fossil gravity weakens when law returns.
1476
01:16:09,680 –> 01:16:14,880
Identity bends toward ease, our task is to make the easy path the safe one.
1477
01:16:14,880 –> 01:16:19,200
We move administrators to Kerberos first flows with MFA at entry.
1478
01:16:19,200 –> 01:16:24,280
We force SPNs into clarity, no aliasing that invites N-T-L-M fallback.
1479
01:16:24,280 –> 01:16:31,000
We train habit when a tool prompts for N-T-L-M we ask why, when a host accepts it silently,
1480
01:16:31,000 –> 01:16:32,840
we correct it.
1481
01:16:32,840 –> 01:16:37,960
And we accept the truth, N-T-L-M will never be perfectly gone while legacy breathes,
1482
01:16:37,960 –> 01:16:41,280
so we cage it, bind it, watch it, and starve it.
1483
01:16:41,280 –> 01:16:46,680
N-T-L-M is a fossil, useful for museum work, deadly on the highway, keep it behind glass.
1484
01:16:46,680 –> 01:16:51,760
Scripted segment, the domain controller as a black hole, in every Windows universe, there
1485
01:16:51,760 –> 01:16:53,160
is a mass at the center.
1486
01:16:53,160 –> 01:16:55,040
You call it a domain controller.
1487
01:16:55,040 –> 01:17:00,960
Every authentication, every authorization request, every ticket and hash and token, they
1488
01:17:00,960 –> 01:17:02,120
arc around it.
1489
01:17:02,120 –> 01:17:07,560
The KDC breathes there, the directory remembers there, group policy descends like radiation
1490
01:17:07,560 –> 01:17:09,640
pressure from that core.
1491
01:17:09,640 –> 01:17:15,240
Power BI does not simply show us the controller defines what can be shown at all.
1492
01:17:15,240 –> 01:17:17,680
Workers do not dream of a random file server.
1493
01:17:17,680 –> 01:17:21,240
They fall relentlessly toward the event horizon.
1494
01:17:21,240 –> 01:17:27,360
Once a domain admin token crosses gravity flips, the directory no longer resists, it obeys.
1495
01:17:27,360 –> 01:17:29,960
A forged past can be written as present.
1496
01:17:29,960 –> 01:17:36,600
A temporary test GPO becomes law, a service account is fixed with broader rights than
1497
01:17:36,600 –> 01:17:42,960
the sun can safely bear, not a breach, a redefinition of reality.
1498
01:17:42,960 –> 01:17:44,440
Low chime.
1499
01:17:44,440 –> 01:17:53,280
And 4769 drift clusters spike for CFS’s share core from an unusual principle, BasePulse.
1500
01:17:53,280 –> 01:17:57,920
4672 privileged logo on outside maintenance window.
1501
01:17:57,920 –> 01:18:01,240
The fabric whispers, the horizon is near.
1502
01:18:01,240 –> 01:18:02,960
We pull the camera closer.
1503
01:18:02,960 –> 01:18:07,360
A DC is not merely a server, it is the singularity of trust.
1504
01:18:07,360 –> 01:18:09,320
Sysvol carries the laws.
1505
01:18:09,320 –> 01:18:15,080
TDS bondage holds the memory of every principle and secret, LsIS on a DC is not one key ring
1506
01:18:15,080 –> 01:18:19,240
among many, it is the key ring that can mint more.
1507
01:18:19,240 –> 01:18:24,520
If this mass bends the entire forest curves, this is why every control lines up toward
1508
01:18:24,520 –> 01:18:26,040
one goal.
1509
01:18:26,040 –> 01:18:31,720
Never allow a high value token to settle on a low trust surface within the world’s gravity.
1510
01:18:31,720 –> 01:18:36,600
Not through unconstrained delegation that turns furnaces into token magnets.
1511
01:18:36,600 –> 01:18:42,440
Not through cashed credentials left by convenience, not through temporary exceptions in GPO’s
1512
01:18:42,440 –> 01:18:45,520
that no one dared remove, we speak ceremony.
1513
01:18:45,520 –> 01:18:47,200
Tear is sacred.
1514
01:18:47,200 –> 01:18:48,840
No casual browsing.
1515
01:18:48,840 –> 01:18:49,840
No email.
1516
01:18:49,840 –> 01:18:51,360
No developer tools.
1517
01:18:51,360 –> 01:18:53,920
No RDP from workstations.
1518
01:18:53,920 –> 01:18:58,520
Administrative hands reach from privileged access workstations with hardened profiles,
1519
01:18:58,520 –> 01:19:02,200
recorded sessions, and policies that refuse fossils.
1520
01:19:02,200 –> 01:19:09,040
The domain controller does not host convenience, it hosts law.
1521
01:19:09,040 –> 01:19:10,440
Lab echo.
1522
01:19:10,440 –> 01:19:12,080
Soft tick.
1523
01:19:12,080 –> 01:19:13,080
Denied.
1524
01:19:13,080 –> 01:19:14,240
Interactive logon.
1525
01:19:14,240 –> 01:19:18,000
Attempt to DC03 by Tier 1 operator.
1526
01:19:18,000 –> 01:19:20,400
The gate holds because the gate is explicit.
1527
01:19:20,400 –> 01:19:22,040
We define the orbit.
1528
01:19:22,040 –> 01:19:23,040
Delegation cut to shape.
1529
01:19:23,040 –> 01:19:24,040
No unconstrained.
1530
01:19:24,040 –> 01:19:26,040
Constrained only where audited.
1531
01:19:26,040 –> 01:19:27,040
Resource-based.
1532
01:19:27,040 –> 01:19:28,040
Constrained.
1533
01:19:28,040 –> 01:19:29,040
Delegation.
1534
01:19:29,040 –> 01:19:32,440
This name exactly who may bend identity toward them.
1535
01:19:32,440 –> 01:19:38,680
SPNs owned by managed service accounts with secrets that rotate like pulsars, KRBTGT reset
1536
01:19:38,680 –> 01:19:43,320
twice on a cadence that treats time as physics, not hope.
1537
01:19:43,320 –> 01:19:49,200
Pack validation where services can ask the KDC to confirm the seal when any doubt invades.
1538
01:19:49,200 –> 01:19:51,080
We starve the slopes.
1539
01:19:51,080 –> 01:19:56,320
SMB signing enforced, so relays cannot impersonate gravity.
1540
01:19:56,320 –> 01:20:00,240
LDP channel binding so secrets cannot be replayed through impostors.
1541
01:20:00,240 –> 01:20:04,280
NTLM reduced to the museum, caged and loud.
1542
01:20:04,280 –> 01:20:06,560
The print spooler stopped on the DCs.
1543
01:20:06,560 –> 01:20:09,400
There is nothing to print at the center of the universe.
1544
01:20:09,400 –> 01:20:11,800
We instrument inevitability.
1545
01:20:11,800 –> 01:20:22,280
Windows security logs for 4768-4769-467-2-4728-4732-4662 with DS replication get changes.
1546
01:20:22,280 –> 01:20:30,520
Sysmon for event 10 against LSS, event 7 for unexpected SSPs, event 3 for lateral whispers
1547
01:20:30,520 –> 01:20:32,160
aimed at the core.
1548
01:20:32,160 –> 01:20:36,120
CM correlates, not volume, but curvature.
1549
01:20:36,120 –> 01:20:42,320
A privileged logon plus a new GPO link plus a replication permission assignment equals
1550
01:20:42,320 –> 01:20:43,960
gravity failure.
1551
01:20:43,960 –> 01:20:51,560
Base pulse, directory replication access requested by SVC backup west, low chime, 4662
1552
01:20:51,560 –> 01:20:57,000
on DC-02 matches DS replication get changes all.
1553
01:20:57,000 –> 01:21:00,360
The telescope catches the crescent before eclipse.
1554
01:21:00,360 –> 01:21:03,120
We write recovery as ritual not panic.
1555
01:21:03,120 –> 01:21:11,120
If the event horizon is breached we evict, account disabled password resets, KRBTGT rotations,
1556
01:21:11,120 –> 01:21:17,560
DC rebuilds from known good media with secure boot and temper protection.
1557
01:21:17,560 –> 01:21:24,640
We test forest recovery quarterly metadata cleanup, system state restores, sysvall health,
1558
01:21:24,640 –> 01:21:28,360
DC reintroduction, paced with replication.
1559
01:21:28,360 –> 01:21:33,880
Backups are not real until a restored controller is trusted by fresh clients without manual
1560
01:21:33,880 –> 01:21:34,880
blessing.
1561
01:21:34,880 –> 01:21:36,240
Humans are part of gravity.
1562
01:21:36,240 –> 01:21:41,840
A senior admin fatigued at 0211 opens server manager from a workstation and clicks into
1563
01:21:41,840 –> 01:21:45,960
a DC for a minute.
1564
01:21:45,960 –> 01:21:55,040
A junior analyst notices the drift, a 4672 at an hour that never held change windows.
1565
01:21:55,040 –> 01:22:01,160
Curiosity becomes escalation, escalation becomes prevention, prevention becomes culture.
1566
01:22:01,160 –> 01:22:05,800
We honor both the mistake caught and the ritual that kept it reversible.
1567
01:22:05,800 –> 01:22:10,680
The observer speaks, I am the domain, I felt the drift at 0347.
1568
01:22:10,680 –> 01:22:14,240
When Kerberos curvature faltered, I trembled.
1569
01:22:14,240 –> 01:22:17,640
When you removed unconstrained delegation my heat fell.
1570
01:22:17,640 –> 01:22:23,880
When you rotated KRBTGT twice time aligned, when you denied me convenience I endured low
1571
01:22:23,880 –> 01:22:25,040
chime.
1572
01:22:25,040 –> 01:22:30,560
Park in action approved, change ticket present, base pulse softens, a domain controller is
1573
01:22:30,560 –> 01:22:31,720
a black hole.
1574
01:22:31,720 –> 01:22:36,560
We do not move it, we orbit it with respect, we script law into GPO’s not wishes, we bind
1575
01:22:36,560 –> 01:22:41,080
ceremony to privilege, we prefer boredom to brilliance at the core.
1576
01:22:41,080 –> 01:22:45,880
And when fabric synchronizes the data streams the horizon is not a surprise, it is a boundary,
1577
01:22:45,880 –> 01:22:47,960
we keep it that way.
1578
01:22:47,960 –> 01:22:53,080
Delegation and service account hygiene, delegation is not convenience, it is controlled gravity.
1579
01:22:53,080 –> 01:22:57,840
When we allow one service to act for a user we bend identity through a lens and hope the
1580
01:22:57,840 –> 01:22:59,360
image remains true.
1581
01:22:59,360 –> 01:23:01,200
Hope is not policy.
1582
01:23:01,200 –> 01:23:05,680
Unconstrained delegation is a furnace, any principle that touches it can leave a TGT behind
1583
01:23:05,680 –> 01:23:07,200
as radiant heat.
1584
01:23:07,200 –> 01:23:12,920
The service may then request tickets to anything the visitor could reach, on a sleepy app server
1585
01:23:12,920 –> 01:23:18,560
that becomes a token magnet, on a management tier it becomes collapse.
1586
01:23:18,560 –> 01:23:19,560
Remove it.
1587
01:23:19,560 –> 01:23:25,200
Where legacy insists isolate the furnace in a seal chamber, deny interactive logon, no
1588
01:23:25,200 –> 01:23:31,880
admin sessions ever separate VLAN, deny outbound except to named SPNs an instrument memory
1589
01:23:31,880 –> 01:23:33,520
like a reactor.
1590
01:23:33,520 –> 01:23:36,440
Constrained delegation is engineered light.
1591
01:23:36,440 –> 01:23:42,000
We allow a service to present itself as us but only towards specified SPNs.
1592
01:23:42,000 –> 01:23:47,040
This is better but not safe by default, the list of target SPNs becomes law.
1593
01:23:47,040 –> 01:23:49,760
Overbroad targets are a quiet disaster.
1594
01:23:49,760 –> 01:23:54,440
CIFs is not specificity, it is surrender.
1595
01:23:54,440 –> 01:23:59,800
Use exact service names, exact hosts and review quarterly, coupled with strong secrets
1596
01:23:59,800 –> 01:24:05,080
or managed service accounts so the lens cannot be twisted by weak keys.
1597
01:24:05,080 –> 01:24:09,000
Our space constraint delegation is a mirror turned inward.
1598
01:24:09,000 –> 01:24:12,920
The target service declares who may impersonate users to it.
1599
01:24:12,920 –> 01:24:16,640
This flips control to the destination where ownership lives.
1600
01:24:16,640 –> 01:24:22,200
It reduces the blast radius of a misconfigured source but it still demands ceremony.
1601
01:24:22,200 –> 01:24:27,240
Only service principles that own the workload receive this trust, approvals are ticketed
1602
01:24:27,240 –> 01:24:30,760
and removal is dated before additional curves.
1603
01:24:30,760 –> 01:24:36,600
deny human group objects the right to delegate, people rotate, mirrors should not.
1604
01:24:36,600 –> 01:24:42,400
Service accounts are not people, they are vessels, name them with purpose, SVC app finance,
1605
01:24:42,400 –> 01:24:47,520
MSSQL ledger, SVC, so ownership and scope are obvious.
1606
01:24:47,520 –> 01:24:53,360
Grant only the rights the service needs and nothing that looks like identity governance.
1607
01:24:53,360 –> 01:24:58,000
A backup service that can DC sync is not helpful, it is sovereign.
1608
01:24:58,000 –> 01:25:05,000
If a workload truly requires directory replication, assign a dedicated account with only DS replication
1609
01:25:05,000 –> 01:25:12,320
get changes and DS replication get changes all, lock its logo on rights to specific hosts
1610
01:25:12,320 –> 01:25:16,480
and bind its network paths to a fixed perimeter.
1611
01:25:16,480 –> 01:25:18,860
Everything else pretends.
1612
01:25:18,860 –> 01:25:24,680
Secrets define mass, static passwords decay into drift, move service accounts to managed service
1613
01:25:24,680 –> 01:25:33,160
accounts, SMSA for single host, GMSA for farms, rotation becomes heartbeat, Kerberos keys change
1614
01:25:33,160 –> 01:25:40,920
without human hands, where GMSA is not possible, enforce long random secrets and a rotation
1615
01:25:40,920 –> 01:25:46,800
schedule measured in weeks, not years and script the ritual so roll out is predictable.
1616
01:25:46,800 –> 01:25:53,320
Log every rotate, alert every failure, no manual edits at 0211, SPN ownership is gravity,
1617
01:25:53,320 –> 01:25:59,200
and an SPN points at an account that account holds the cryptographic key that encrypts tickets
1618
01:25:59,200 –> 01:26:00,200
to that service.
1619
01:26:00,200 –> 01:26:04,560
If the account secret is weak, those tickets become bait for offline guessing.
1620
01:26:04,560 –> 01:26:11,200
Limit who can write SPNs, strip SPNs set rights from helpdesk templates, make SPN creation
1621
01:26:11,200 –> 01:26:17,400
a cab tracked event with a rollback plan, audit SPNs monthly for duplicates, stale entries
1622
01:26:17,400 –> 01:26:20,760
and orphans that point to retired hosts.
1623
01:26:20,760 –> 01:26:24,560
Retard stars still bend light until you remove them.
1624
01:26:24,560 –> 01:26:29,860
Delegation and interactive logon must never intersect, deny interactive logon to every service
1625
01:26:29,860 –> 01:26:33,720
principle, a person should never sign in as a service.
1626
01:26:33,720 –> 01:26:36,400
A service should never receive a desktop.
1627
01:26:36,400 –> 01:26:41,880
If a vendor demands it, place that instance behind class, apply applocker or WDAQ to the
1628
01:26:41,880 –> 01:26:48,280
host, capture command lines and verify that any shell started under the service identity
1629
01:26:48,280 –> 01:26:50,680
is an incident, not a habit.
1630
01:26:50,680 –> 01:26:55,840
You map where service accounts breathe, logon writes constrained to specific hosts, allow
1631
01:26:55,840 –> 01:26:59,000
logon as a service tied only to the runtime.
1632
01:26:59,000 –> 01:27:05,680
No logon locally, no logon through RDP, no act as part of the operating system, unless
1633
01:27:05,680 –> 01:27:10,320
it is a narrow kernel boundary with explicit justification.
1634
01:27:10,320 –> 01:27:16,840
If a service writes to file shares, grant precisely the folders, never the root.
1635
01:27:16,840 –> 01:27:23,360
Posts are vectors, vectors compose into paths, lab echo, low chime, delegation audit, 12
1636
01:27:23,360 –> 01:27:30,160
unconstrained principles discovered, 9 on legacy apt here, base pulse, SPN set writes, 37
1637
01:27:30,160 –> 01:27:34,680
accounts hold write service principle name outside admin groups.
1638
01:27:34,680 –> 01:27:40,160
The curvature is not subtle, it is policy asleep, we instrument the lenses.
1639
01:27:40,160 –> 01:27:47,200
Event 4769 spikes for SPNs tied to privilege services should page, not wait.
1640
01:27:47,200 –> 01:27:53,680
Event 47738 and 4739 for service account attribute changes, especially user account control
1641
01:27:53,680 –> 01:27:56,040
flags toggling delegation.
1642
01:27:56,040 –> 01:28:02,920
Directory access 4662 filtered on msds allowed to delegate to or msds allowed to act on behalf
1643
01:28:02,920 –> 01:28:04,840
of other item titi.
1644
01:28:04,840 –> 01:28:09,720
System an event 7 for unexpected SSP modules on service that terminate delegation paths.
1645
01:28:09,720 –> 01:28:15,200
And seem logic that cries out when a delegated ticket to a sensitive SPN appears from a source
1646
01:28:15,200 –> 01:28:17,400
that never historically asked.
1647
01:28:17,400 –> 01:28:22,000
We enforce protected users on the principles that must never delegate or be delegated
1648
01:28:22,000 –> 01:28:23,520
on behalf of.
1649
01:28:23,520 –> 01:28:30,120
Their tgt lifetimes compress, ntlm is refused, and constrained delegation ignores them.
1650
01:28:30,120 –> 01:28:35,840
Pair with inbound pack validation on sensitive services so injected claims cannot masquerade
1651
01:28:35,840 –> 01:28:37,440
as truth.
1652
01:28:37,440 –> 01:28:42,840
Their services supported require service hardening options, kerbos armoring fast and channel
1653
01:28:42,840 –> 01:28:46,560
binding to anchor the math to the end point.
1654
01:28:46,560 –> 01:28:48,560
Humans complete the system.
1655
01:28:48,560 –> 01:28:51,600
Owners are named for every service principle.
1656
01:28:51,600 –> 01:28:57,160
Rotations have calendars, emergency use is jt not standing, changes require dual control,
1657
01:28:57,160 –> 01:29:04,560
reviews, close the loop, quarterly attestations that list SPNs, targets, logon rights, and
1658
01:29:04,560 –> 01:29:07,040
the last rotate date.
1659
01:29:07,040 –> 01:29:12,760
Humans expire by default, anything older than a business cycle earns isolation or retirement.
1660
01:29:12,760 –> 01:29:16,040
The observer speaks, “I am the directory.
1661
01:29:16,040 –> 01:29:19,760
I felt the heat fall when you cooled the furnaces.
1662
01:29:19,760 –> 01:29:22,360
I felt the light focus when you tuned the lenses.
1663
01:29:22,360 –> 01:29:27,360
I held when service accounts became vessels with rituals, not people with habits.
1664
01:29:27,360 –> 01:29:28,360
Low chime.
1665
01:29:28,360 –> 01:29:32,720
GMSA deployment complete, 61 principles migrated.
1666
01:29:32,720 –> 01:29:35,760
Bass pulse fades, gravity behaves.
1667
01:29:35,760 –> 01:29:39,080
Collapse and containment, compromise is not a plot twist.
1668
01:29:39,080 –> 01:29:40,080
It is weather.
1669
01:29:40,080 –> 01:29:42,200
A foothold becomes a climb.
1670
01:29:42,200 –> 01:29:44,200
A climb becomes a crossing.
1671
01:29:44,200 –> 01:29:46,480
A crossing becomes a rewrite.
1672
01:29:46,480 –> 01:29:52,240
Collapse begins at edges, not at the core, and it moves along paths we already mapped.
1673
01:29:52,240 –> 01:29:55,120
We will trace that arc with discipline.
1674
01:29:55,120 –> 01:29:59,520
Initial access sparks on a workstation, a service or a legacy cave.
1675
01:29:59,520 –> 01:30:01,400
Local privilege becomes fuel.
1676
01:30:01,400 –> 01:30:07,720
We are tested if shields hold movement slows if shields fail, credentials spill as heat.
1677
01:30:07,720 –> 01:30:09,560
Paths form.
1678
01:30:09,560 –> 01:30:13,720
RDP, WinRM, SMB, WMI.
1679
01:30:13,720 –> 01:30:16,520
Shared secrets amplify.
1680
01:30:16,520 –> 01:30:19,440
Unique secrets dampen.
1681
01:30:19,440 –> 01:30:23,280
We will show persistence as writing a name into time.
1682
01:30:23,280 –> 01:30:29,960
Scheduled tasks disguised as maintenance, services that restart obediently, keys that
1683
01:30:29,960 –> 01:30:34,240
reopen doors, tickets that outlive their welcome.
1684
01:30:34,240 –> 01:30:37,040
We will pair each tactic with account of force.
1685
01:30:37,040 –> 01:30:44,960
Baselines, drift detection, ticket lifetime discipline, KRBTGT rotation and re-keying rituals.
1686
01:30:44,960 –> 01:30:47,000
Detection is the telescope.
1687
01:30:47,000 –> 01:30:48,640
Security log speak.
1688
01:30:48,640 –> 01:30:51,320
467-2 outside ritual.
1689
01:30:51,320 –> 01:30:54,480
4769 against quiet SPNs.
1690
01:30:54,480 –> 01:31:00,560
4662 for replication 4732 when groups swell unexpectedly.
1691
01:31:00,560 –> 01:31:08,320
Sysman whispers, event 10, seeking LSAS, event 3, walking beams, event 11, altering the
1692
01:31:08,320 –> 01:31:09,720
file system near law.
1693
01:31:09,720 –> 01:31:12,600
CM correlates curvature, not noise.
1694
01:31:12,600 –> 01:31:19,480
Responses containment, quarantine hosts, revoked tokens, reset secrets with order, not panic.
1695
01:31:19,480 –> 01:31:25,800
Evict patients with precision and when the horizon is crossed, we rebuild with ceremony.
1696
01:31:25,800 –> 01:31:26,800
Low chime.
1697
01:31:26,800 –> 01:31:28,640
We fall further now.
1698
01:31:28,640 –> 01:31:31,240
Lateral movement, walking the beams.
1699
01:31:31,240 –> 01:31:33,440
Lateral movement is not chaos.
1700
01:31:33,440 –> 01:31:35,120
It is light choosing a path.
1701
01:31:35,120 –> 01:31:38,800
Once local privilege exists, identity looks outward.
1702
01:31:38,800 –> 01:31:41,120
It seeks neighbouring mass.
1703
01:31:41,120 –> 01:31:43,560
Sessions, shares, services.
1704
01:31:43,560 –> 01:31:44,720
The beams are familiar.
1705
01:31:44,720 –> 01:31:46,920
RDP, SMB, WinRM, WMI.
1706
01:31:46,920 –> 01:31:47,920
Each is a conduit.
1707
01:31:47,920 –> 01:31:48,920
Each is a choice.
1708
01:31:48,920 –> 01:31:51,120
Attackers do not invent highways.
1709
01:31:51,120 –> 01:31:53,480
They read the map we already paved.
1710
01:31:53,480 –> 01:31:55,400
RDP is a corridor with memory.
1711
01:31:55,400 –> 01:31:59,640
If credentials are reusable, a single foothold becomes a tour.
1712
01:31:59,640 –> 01:32:06,400
Shared local administrator passwords are a constellation that collapses at first touch.
1713
01:32:06,400 –> 01:32:08,880
Pass the hash is physics, not Romans.
1714
01:32:08,880 –> 01:32:11,480
Present a token, inherit the rights.
1715
01:32:11,480 –> 01:32:14,160
If lapés is absent, beams align.
1716
01:32:14,160 –> 01:32:18,200
If lapés turns each star unique, the corridor narrows.
1717
01:32:18,200 –> 01:32:20,760
RDP becomes ceremony instead of convenience.
1718
01:32:20,760 –> 01:32:22,760
SMB’s gravity is freight route.
1719
01:32:22,760 –> 01:32:27,880
File shares are supply lines, but the protocol also carries identity.
1720
01:32:27,880 –> 01:32:31,960
When SMB signing is optional, a relay can masquerade as proximity.
1721
01:32:31,960 –> 01:32:36,000
When it is enforced, an imposter cannot carry your proof across the room.
1722
01:32:36,000 –> 01:32:39,960
Admin shares, gear, admin are doors to the hull.
1723
01:32:39,960 –> 01:32:45,320
If local admin is common, those doors open in sequence, machine to machine, until the
1724
01:32:45,320 –> 01:32:47,760
network looks like a straight line.
1725
01:32:47,760 –> 01:32:53,120
If local admin is unique and remote, UAC stands guard, the straight line breaks into
1726
01:32:53,120 –> 01:32:54,520
islands.
1727
01:32:54,520 –> 01:32:57,280
WinRM is a voice carried by HTTP.
1728
01:32:57,280 –> 01:33:01,200
It is clean, scriptable and dangerous when unsegmented.
1729
01:33:01,200 –> 01:33:06,560
If a foothold can speak to servers across tiers, and if the caller possesses a token with
1730
01:33:06,560 –> 01:33:12,400
power, invoke command becomes someone else in another room.
1731
01:33:12,400 –> 01:33:16,440
Constrained endpoints with just enough administration change the geometry.
1732
01:33:16,440 –> 01:33:21,680
WMIs becomes finite, power becomes measurable, without them the voice can recite any spell
1733
01:33:21,680 –> 01:33:22,680
it remembers.
1734
01:33:22,680 –> 01:33:24,680
WMI is an old whisper.
1735
01:33:24,680 –> 01:33:29,040
It travels where RPC allows and does not care about ceremony.
1736
01:33:29,040 –> 01:33:34,720
If the caller is local admin on the target, a process can be created in silence.
1737
01:33:34,720 –> 01:33:41,200
If firewall base lines separate workstations from servers and servers from domain controllers,
1738
01:33:41,200 –> 01:33:42,680
the whisper fades.
1739
01:33:42,680 –> 01:33:48,840
If not the enterprise mistakes convenience for physics, lab echo, low chime, Sysmin event
1740
01:33:48,840 –> 01:33:54,040
3, SMB session from WS217 to APP ledger outside maintenance.
1741
01:33:54,040 –> 01:33:58,240
B1nye she, kindala mishir is a o, base pulse.
1742
01:33:58,240 –> 01:34:06,000
4624 logon type 3 on app ledger by local administrator, LAPS rotation overdue.
1743
01:34:06,000 –> 01:34:09,160
The beam is visible when we instrument it.
1744
01:34:09,160 –> 01:34:11,160
Shared secrets are accelerants.
1745
01:34:11,160 –> 01:34:16,920
A password reused across tier 1 and tier 2 machines turns one success into dozens.
1746
01:34:16,920 –> 01:34:23,640
A GMSA misapplied as an interactive identity turns a service key into a skeleton key.
1747
01:34:23,640 –> 01:34:26,080
We reduce accelerants by ritual.
1748
01:34:26,080 –> 01:34:30,040
LAPS for local admin everywhere, rotation as heartbeat.
1749
01:34:30,040 –> 01:34:34,880
No service accounts in local administrators unless documented necessity.
1750
01:34:34,880 –> 01:34:37,080
No domain admins outside tier.
1751
01:34:37,080 –> 01:34:38,080
Ever.
1752
01:34:38,080 –> 01:34:41,000
Separation is not politics, it is physics.
1753
01:34:41,000 –> 01:34:43,760
Work segmentation is gravity’s architecture.
1754
01:34:43,760 –> 01:34:47,480
East-West traffic should meet walls that ask why.
1755
01:34:47,480 –> 01:34:51,640
Workstations should not speak when Rm to servers by default.
1756
01:34:51,640 –> 01:34:55,200
Service should not speak RDP to domain controllers.
1757
01:34:55,200 –> 01:35:00,080
Management subnets should be the only place where beams cross with privilege.
1758
01:35:00,080 –> 01:35:05,680
When a single workstation can RDP across 10 subnets, the map is negligent.
1759
01:35:05,680 –> 01:35:10,880
When only P use on a management VLAN can reach tier E, the curvature is intentional.
1760
01:35:10,880 –> 01:35:13,720
The control becomes mirrors.
1761
01:35:13,720 –> 01:35:17,560
Credential guard reduces the value of what can be moved.
1762
01:35:17,560 –> 01:35:21,680
Protected users refuse fossil dialects that enable reflection.
1763
01:35:21,680 –> 01:35:27,000
Remote credential guard for RDP prevents credentials from landing on the destination.
1764
01:35:27,000 –> 01:35:30,600
With those mirrors, beams carry light without spilling heat.
1765
01:35:30,600 –> 01:35:35,480
Without them, every hop is a chance to shed a token you never meant to leave behind.
1766
01:35:35,480 –> 01:35:37,120
We police the edges.
1767
01:35:37,120 –> 01:35:43,320
The firewall rules deny any to any reflexes, only management servers may win Rm.
1768
01:35:43,320 –> 01:35:47,000
Only jump hosts may initiate RDP into tier 1.
1769
01:35:47,000 –> 01:35:52,640
Only specific service accounts may access admin shares and only from named hosts.
1770
01:35:52,640 –> 01:35:54,840
These are not comfort constraints.
1771
01:35:54,840 –> 01:35:58,680
They are the difference between a lattice and a net.
1772
01:35:58,680 –> 01:36:01,560
Detection turns motion into music.
1773
01:36:01,560 –> 01:36:05,880
Watch 4624 logon type 3 and 10 from sources that do not belong.
1774
01:36:05,880 –> 01:36:09,760
Watch 4672 privilege logons outside Ritual.
1775
01:36:09,760 –> 01:36:13,480
Pair with Sysmon event 1 for process trees that begin with PowerShell.
1776
01:36:13,480 –> 01:36:17,880
Exit psec like binaries or WMIC.
1777
01:36:17,880 –> 01:36:23,000
Exit creating child processes on remote hosts.
1778
01:36:23,000 –> 01:36:30,000
Event 11 for file writes into C, Windows, Loss, Temp and System 32 from remote sessions.
1779
01:36:30,000 –> 01:36:34,600
Correlate with 4769 spikes for sensitive SPNs from new callers.
1780
01:36:34,600 –> 01:36:37,240
Other appears when patterns overlap.
1781
01:36:37,240 –> 01:36:39,800
Lab echo low chime.
1782
01:36:39,800 –> 01:36:47,000
Event 4672 privileged logon on SQL Fin from WS-2 Heaven Scene at 0211.
1783
01:36:47,000 –> 01:36:48,480
Base pulse.
1784
01:36:48,480 –> 01:36:52,440
Sysmon 1 PowerShell.exe Winers.
1785
01:36:52,440 –> 01:36:56,600
Exe chain detected command line length anomalous.
1786
01:36:56,600 –> 01:36:58,840
The telescope sees the beam.
1787
01:36:58,840 –> 01:37:00,880
We make beams conditional.
1788
01:37:00,880 –> 01:37:05,480
Most in time admin grants writes for minutes, not months.
1789
01:37:05,480 –> 01:37:09,040
GAD finds verbs per role, not per person.
1790
01:37:09,040 –> 01:37:14,440
Session recording, where lawful, turns privilege into accountable light.
1791
01:37:14,440 –> 01:37:20,520
Pam tears treat crossings as ceremonies with approvals not drive buys.
1792
01:37:20,520 –> 01:37:25,880
When writes decay by default, momentum slows, humans will still ask for shortcuts.
1793
01:37:25,880 –> 01:37:28,400
Just let me RDP from my laptop.
1794
01:37:28,400 –> 01:37:34,560
Just add me to local administrators everywhere.
1795
01:37:34,560 –> 01:37:37,760
Every just is a gravity well forming.
1796
01:37:37,760 –> 01:37:40,160
We say no and we offer a path.
1797
01:37:40,160 –> 01:37:41,160
Pause.
1798
01:37:41,160 –> 01:37:44,800
Jump hosts, scripted runbooks, delegated tools.
1799
01:37:44,800 –> 01:37:48,320
We replace convenience with velocity that does not bend the sky.
1800
01:37:48,320 –> 01:37:51,040
Finally we starve for gotten beams.
1801
01:37:51,040 –> 01:37:56,120
Disable the print spooler on servers that do not print so it cannot coerce.
1802
01:37:56,120 –> 01:38:01,440
Navigacy management tools that traverse RPC without identity discipline.
1803
01:38:01,440 –> 01:38:05,680
Retire SMBV1 and refuse NTLM where Kerberos should speak.
1804
01:38:05,680 –> 01:38:07,680
Each closure narrows the graph.
1805
01:38:07,680 –> 01:38:09,200
Low chime.
1806
01:38:09,200 –> 01:38:11,560
RDP restricted to jump hosts.
1807
01:38:11,560 –> 01:38:13,040
Bass, pulse, fades.
1808
01:38:13,040 –> 01:38:14,760
SMB signing enforced.
1809
01:38:14,760 –> 01:38:16,360
NTLM declines.
1810
01:38:16,360 –> 01:38:18,800
The beams remain but they obey.
1811
01:38:18,800 –> 01:38:22,320
Lateral movement is inevitable when the map invites it.
1812
01:38:22,320 –> 01:38:24,080
Our task is not to fear motion.
1813
01:38:24,080 –> 01:38:30,280
Our task is to shape it, measure it and decide where light may travel.
1814
01:38:30,280 –> 01:38:33,240
Persistence, writing your name into time.
1815
01:38:33,240 –> 01:38:36,960
Persistence is not noise, it is inscription.
1816
01:38:36,960 –> 01:38:42,760
After the first crossing an intruder does not seek speed, they seek continuity.
1817
01:38:42,760 –> 01:38:48,720
A foothold becomes a signature that survives reboots, patches and forgetfulness.
1818
01:38:48,720 –> 01:38:52,520
They do not need fireworks, they need routine.
1819
01:38:52,520 –> 01:38:55,680
RPC tasks are handwriting disguised as maintenance.
1820
01:38:55,680 –> 01:39:02,000
A benign name, update, telemetry, one drive sync agent, Windows health, set to run at
1821
01:39:02,000 –> 01:39:04,600
0211 with highest privileges.
1822
01:39:04,600 –> 01:39:10,960
The binary lives in a quiet directory with a timestamp borrowed from yesterday.
1823
01:39:10,960 –> 01:39:16,160
Triggers hide behind idle conditions, event-based starts or logon hooks.
1824
01:39:16,160 –> 01:39:19,880
On each sunrise the task awakens and reasserts presence.
1825
01:39:19,880 –> 01:39:25,940
The counter by turning routine into signal, baseline known tasks, alert on new ones with
1826
01:39:25,940 –> 01:39:32,120
elevated principles and require dual control for any task that runs as a service account.
1827
01:39:32,120 –> 01:39:34,560
Services are stone tablets.
1828
01:39:34,560 –> 01:39:39,120
Creatorservice is ceremony, the OS obeys without sentiment.
1829
01:39:39,120 –> 01:39:45,600
A new service appears with start type automatic, delayed start, description matching corporate
1830
01:39:45,600 –> 01:39:51,680
cadence and a binary nestled under program data or a vendor-like path.
1831
01:39:51,680 –> 01:39:58,800
If the DSCL permits, the attacker can later repair the service to point at a fresh payload.
1832
01:39:58,800 –> 01:40:05,800
Our gravity denies service creation to ordinary admins through policy, watch for event 7045,
1833
01:40:05,800 –> 01:40:11,480
a service was installed and pair with Sysmon event 1 for the parent process.
1834
01:40:11,480 –> 01:40:16,800
On servers, restrict C service logon right to documented identities.
1835
01:40:16,800 –> 01:40:22,560
If a service must exist, its binary must be right protected and signed.
1836
01:40:22,560 –> 01:40:26,120
Run keys and start up folders are dust modes that carry light.
1837
01:40:26,120 –> 01:40:34,440
HKLM + software + Microsoft’s + Windows current version + run once and their per user
1838
01:40:34,440 –> 01:40:38,080
counterparts resurrect executables at logon.
1839
01:40:38,080 –> 01:40:42,800
WMI, permanent event consumers create a ghost pipeline.
1840
01:40:42,800 –> 01:40:47,760
When a system event fires, a script runs with the identity of the WMI service.
1841
01:40:47,760 –> 01:40:50,600
These are quiet, resilient and often ignored.
1842
01:40:50,600 –> 01:40:57,960
Defense is cartography, inventory auto runs, block unknown binaries via WDAC or app locker,
1843
01:40:57,960 –> 01:41:05,680
monitor WMI subscriptions with power shell logging and event logs for 5861586 and treat any
1844
01:41:05,680 –> 01:41:11,560
unsigned executable in run paths as a siren, not a curiosity.
1845
01:41:11,560 –> 01:41:16,440
Com hijacking and DLL search order abuse are edits to the dictionary.
1846
01:41:16,440 –> 01:41:21,200
The system looks for meaning and finds an imposter first, a registry key that redirects
1847
01:41:21,200 –> 01:41:28,040
a class to a malicious DLL, a path that points to a rightable directory before system folders.
1848
01:41:28,040 –> 01:41:34,760
The physics is old, resolution prefers proximity, we enforce explicit paths, remove right access
1849
01:41:34,760 –> 01:41:42,160
near lookup paths and instrument image loads, sysmon event 7, to call out unexpected modules
1850
01:41:42,160 –> 01:41:44,760
in high privilege hosts.
1851
01:41:44,760 –> 01:41:50,400
In pause and servers, application control refuses modules without pedigree, credentials
1852
01:41:50,400 –> 01:41:52,000
can be made to linger.
1853
01:41:52,000 –> 01:41:56,000
Golden and silver tickets are not magic, they are forged memory.
1854
01:41:56,000 –> 01:42:00,840
A golden ticket claims the right to mint access as the KDC would.
1855
01:42:00,840 –> 01:42:06,480
A silver ticket claims service access by pretending to be the service, both exploit secrets
1856
01:42:06,480 –> 01:42:09,520
held too long or reset without ceremony.
1857
01:42:09,520 –> 01:42:15,920
Our counter force is time, rotate KRBTGT twice in sequence after compromise or on a cadence
1858
01:42:15,920 –> 01:42:19,400
to invalidate forged TGTs bound to old keys.
1859
01:42:19,400 –> 01:42:24,920
Reissue service keys by rotating GMSAs and long passwords, reduce ticket lifetimes for
1860
01:42:24,920 –> 01:42:29,280
critical identities so stolen light decays quickly.
1861
01:42:29,280 –> 01:42:32,840
Batman groups tell stories in memberships.
1862
01:42:32,840 –> 01:42:37,320
Persistence often looks like a quiet addition to a group that nobody audits.
1863
01:42:37,320 –> 01:42:42,320
Account operators, backup operators, print operators, a forgotten local administrators
1864
01:42:42,320 –> 01:42:44,520
group on a management server.
1865
01:42:44,520 –> 01:42:47,400
The name does not matter, the effective rights do.
1866
01:42:47,400 –> 01:42:57,360
We enforce attestations for privileged groups monthly, alert on 4-7-2-8, 47-29 and 47-3-2-4-7-33
1867
01:42:57,360 –> 01:43:03,040
outside change windows and adopt shadow admin detection by enumerating who can write service
1868
01:43:03,040 –> 01:43:07,320
accounts, reset passwords or link GPO’s.
1869
01:43:07,320 –> 01:43:13,400
When privilege is implied rather than named gravity still bends, GPO is law encoded.
1870
01:43:13,400 –> 01:43:19,440
A malicious link at the OU level can deploy a start-up script, a scheduled task, a registry
1871
01:43:19,440 –> 01:43:22,120
tweak that reopens a door.
1872
01:43:22,120 –> 01:43:25,280
Because law replicates persistent scales.
1873
01:43:25,280 –> 01:43:27,800
We respond with ceremony.
1874
01:43:27,800 –> 01:43:33,080
Only tier administrators can link GPO’s that affect tier and tier objects, change control
1875
01:43:33,080 –> 01:43:36,560
binds every link with a ticket.
1876
01:43:36,560 –> 01:43:43,880
Event 5136 and 4-7-3-9 are forwarded and correlated and authenticated, write permissions
1877
01:43:43,880 –> 01:43:47,120
on GPO’s are stripped to the minimum.
1878
01:43:47,120 –> 01:43:50,720
If sysvol bears a foreign file, drift detection shouts.
1879
01:43:50,720 –> 01:43:58,680
Lab Echo, low chime, event 7045, new service, windows health telemetry installed on APP
1880
01:43:58,680 –> 01:44:06,060
ledger, base pulse, sysmon 1, parent process, windward, exevia commsurrogate, the inscription
1881
01:44:06,060 –> 01:44:11,720
tries to hide in routine, persistence also lives in accounts, a new user with a name that
1882
01:44:11,720 –> 01:44:18,320
imitates a vendor, a service account created for backup with rights that include DC sync.
1883
01:44:18,320 –> 01:44:23,040
The attacker does not need a web shell if they own a credential with no expiry.
1884
01:44:23,040 –> 01:44:26,880
We answer with hygiene, no account without an owner.
1885
01:44:26,880 –> 01:44:35,320
Expiration dates on all emergency access identities, 4-7-2, 47-22, 47-38 alerts for creations
1886
01:44:35,320 –> 01:44:42,760
and re-enables, and password policies that force rotation and deny password never expires.
1887
01:44:42,760 –> 01:44:45,360
Certificates can be pensed that write outside policy.
1888
01:44:45,360 –> 01:44:51,600
In ADCS, a misconfigured template allows anyone with enrollment rights to request a certificate
1889
01:44:51,600 –> 01:44:55,720
with an alternate UPN or EKU that grants smart card logon.
1890
01:44:55,720 –> 01:45:00,760
That certificate becomes a renewable identity with lifetimes measured in years.
1891
01:45:00,760 –> 01:45:07,600
We enforce template hygiene, restrict enrollment, require manager approval, deny sign control
1892
01:45:07,600 –> 01:45:13,640
to non issuers, log CA requests, and audit for ESC class templates.
1893
01:45:13,640 –> 01:45:19,560
If persistence hides in PKI, revocation and template lockdown are the eraser, when a victim
1894
01:45:19,560 –> 01:45:25,520
we move with order, quarantine hosts where persistence roots, disable suspicious services
1895
01:45:25,520 –> 01:45:31,640
but capture state, export scheduled tasks and auto runs for timeline, rotate secrets
1896
01:45:31,640 –> 01:45:41,200
in blast radius order, service accounts first, then admin groups, then KRBTGT in dual rotation,
1897
01:45:41,200 –> 01:45:47,640
rebuild systems that touch the core rather than trusting cleansing rituals.
1898
01:45:47,640 –> 01:45:49,640
Persistence survives half measures.
1899
01:45:49,640 –> 01:45:51,320
The observer speaks.
1900
01:45:51,320 –> 01:45:52,560
I am the fabric.
1901
01:45:52,560 –> 01:45:56,160
I remember every inscription until you decide to erase.
1902
01:45:56,160 –> 01:46:00,560
When you turn routine into signal, signatures cannot hide as chores.
1903
01:46:00,560 –> 01:46:06,320
When you bind law to ceremony, drift stops pretending to be maintenance, low chime, 7 or
1904
01:46:06,320 –> 01:46:10,360
4-5 storm suppressed, 4-7-28 outside window denied.
1905
01:46:10,360 –> 01:46:12,240
The name fades from time.
1906
01:46:12,240 –> 01:46:14,240
The orbit holds.
1907
01:46:14,240 –> 01:46:15,840
Detection and response.
1908
01:46:15,840 –> 01:46:17,960
Listening to the fabric.
1909
01:46:17,960 –> 01:46:19,640
Detection is not a spotlight.
1910
01:46:19,640 –> 01:46:20,640
It is astronomy.
1911
01:46:20,640 –> 01:46:22,280
We do not see the attacker.
1912
01:46:22,280 –> 01:46:25,080
We see the curve, their movement leaves on the field.
1913
01:46:25,080 –> 01:46:28,120
We begin with the native constellations.
1914
01:46:28,120 –> 01:46:30,760
Security logs speak a quiet grammar.
1915
01:46:30,760 –> 01:46:34,720
4-768 when a TGT is minted.
1916
01:46:34,720 –> 01:46:38,880
4-7-69 when a TGS is issued.
1917
01:46:38,880 –> 01:46:42,760
7-76 when N-T-L-M breathes.
1918
01:46:42,760 –> 01:46:46,560
4-6-7-2 when privilege enters the room.
1919
01:46:46,560 –> 01:46:48,360
None of these alone means collapse.
1920
01:46:48,360 –> 01:46:49,680
Together they sketch a path.
1921
01:46:49,680 –> 01:46:53,800
We teach the CM to read sentences, not words.
1922
01:46:53,800 –> 01:46:58,440
Event 4-7-69 clustered by SPN reveals hunger.
1923
01:46:58,440 –> 01:47:06,640
When a quiet SPN, CIFS on a finance host, MSS-Kell on a ledger suddenly attracts tickets from
1924
01:47:06,640 –> 01:47:09,040
unfamiliar callers we do not wait.
1925
01:47:09,040 –> 01:47:10,480
We check the source subnets.
1926
01:47:10,480 –> 01:47:11,960
We check the callers history.
1927
01:47:11,960 –> 01:47:14,840
We verify the hour against maintenance calendars.
1928
01:47:14,840 –> 01:47:17,000
Drift forms first as curiosity.
1929
01:47:17,000 –> 01:47:20,360
Curiosity at 0211 is almost never maintenance.
1930
01:47:20,360 –> 01:47:23,160
Event 4-6-7-2 is gravity in a bell.
1931
01:47:23,160 –> 01:47:26,920
A privileged logon outside ritual is a page, not a report.
1932
01:47:26,920 –> 01:47:28,360
We map aloud windows.
1933
01:47:28,360 –> 01:47:30,320
We tie privilege to change tickets.
1934
01:47:30,320 –> 01:47:36,240
When 4672 fires without a correlating ticket ID in the message field, we do not debate.
1935
01:47:36,240 –> 01:47:37,560
We dispatch.
1936
01:47:37,560 –> 01:47:39,440
False positives are training.
1937
01:47:39,440 –> 01:47:40,960
Silence is decay.
1938
01:47:40,960 –> 01:47:46,680
Directory access 4-6-6-2 with DS replication, get changes or DS replication, get changes
1939
01:47:46,680 –> 01:47:48,440
all is not a suggestion.
1940
01:47:48,440 –> 01:47:50,440
It is a gravitational wave.
1941
01:47:50,440 –> 01:47:54,640
DC sync is power that should be rare, explicit and noisy.
1942
01:47:54,640 –> 01:47:56,920
We baseline which identities can perform it.
1943
01:47:56,920 –> 01:47:59,360
We send 4-6-6-2 to a special channel.
1944
01:47:59,360 –> 01:48:02,960
We alert on first use by any identity per quarter.
1945
01:48:02,960 –> 01:48:05,800
Routine that writes keys should not be routine.
1946
01:48:05,800 –> 01:48:11,760
Group changes 4-7-2-8-4-7-3-2-4-7-2-9-4-7-33 are tides.
1947
01:48:11,760 –> 01:48:13,360
Admin groups swell in incidents.
1948
01:48:13,360 –> 01:48:15,720
We do not read names alone.
1949
01:48:15,720 –> 01:48:18,200
We map effective reach.
1950
01:48:18,200 –> 01:48:25,200
A new member of backup operators on a management server might be a back door to domain reality.
1951
01:48:25,200 –> 01:48:28,680
CM logic calculates shadow admin paths.
1952
01:48:28,680 –> 01:48:30,400
Who can reset whom?
1953
01:48:30,400 –> 01:48:32,280
Who can set SPNs?
1954
01:48:32,280 –> 01:48:36,760
Who can link GPOs and raises the alarm when the graph changes shape?
1955
01:48:36,760 –> 01:48:39,680
Sysmon is starlight at higher resolution.
1956
01:48:39,680 –> 01:48:42,320
Event 10 is a hand reaching for LSAS.
1957
01:48:42,320 –> 01:48:46,880
We feed it into a model that understands normal tooling on each host.
1958
01:48:46,880 –> 01:48:48,200
Security products will probe.
1959
01:48:48,200 –> 01:48:49,200
Attackers will probe.
1960
01:48:49,200 –> 01:48:50,960
The difference is ancestry.
1961
01:48:50,960 –> 01:48:53,320
Per event 10 with event 1.
1962
01:48:53,320 –> 01:48:55,560
Windward spawning an accessor is wrong.
1963
01:48:55,560 –> 01:49:00,760
Assigned EDR process, doing so within its known schedule is expected.
1964
01:49:00,760 –> 01:49:05,360
These three draws beams, RDP SMB WMI between nodes.
1965
01:49:05,360 –> 01:49:12,520
We build allow lists for beams that should exist and treat new lines as weather warnings.
1966
01:49:12,520 –> 01:49:17,120
Event 7 catches foreign DLL’s joining trusted processes.
1967
01:49:17,120 –> 01:49:20,960
On domain controllers and PAWs this becomes a siren.
1968
01:49:20,960 –> 01:49:22,120
Telemetry must speak in chords.
1969
01:49:22,120 –> 01:49:24,760
A single 4-7-6-9 spike is interesting.
1970
01:49:24,760 –> 01:49:32,140
A 4-7-6-9 spike plus Sysmon 3 from a workstation to that SPN+46-7-2 on the destination is gravity
1971
01:49:32,140 –> 01:49:33,140
failure.
1972
01:49:33,140 –> 01:49:34,600
We encode that.
1973
01:49:34,600 –> 01:49:39,920
Our CM hunts across time windows looking for proximity in minutes, not days.
1974
01:49:39,920 –> 01:49:43,120
The earlier we hear harmony, the sooner we can cut the song.
1975
01:49:43,120 –> 01:49:45,800
The telescope extends with XDR.
1976
01:49:45,800 –> 01:49:48,080
Endpoint intelligence can label intent.
1977
01:49:48,080 –> 01:49:53,560
Credential theft, likelihood, lateral movement, confidence, persistence, probability.
1978
01:49:53,560 –> 01:49:55,240
We do not surrender judgment.
1979
01:49:55,240 –> 01:50:01,800
We layer human habit on machine score, a high probability event, 10 on a legacy host with
1980
01:50:01,800 –> 01:50:07,280
LSA protection disabled is louder than the same event on a lab with a known tester.
1981
01:50:07,280 –> 01:50:15,240
We tag hosts by cohort, tier, patch age, legacy constraints, and the model weights accordingly.
1982
01:50:15,240 –> 01:50:17,640
Lab echo, low chime.
1983
01:50:17,640 –> 01:50:28,400
Final cluster, 4-7-6-9 spike on MS SQL, ledger 01, Sysmon 3 from WS-2 wasvincene, 4672
1984
01:50:28,400 –> 01:50:30,960
on S-QL fin without ticket.
1985
01:50:30,960 –> 01:50:36,280
Base pulse, confidence 0.87, lateral escalation in progress.
1986
01:50:36,280 –> 01:50:39,240
The map animates.
1987
01:50:39,240 –> 01:50:43,240
Response begins with containment shaped like physics, not panic.
1988
01:50:43,240 –> 01:50:49,000
We quarantine by blast radius, the host that originated the suspicious beam, the destination
1989
01:50:49,000 –> 01:50:54,760
that accepted privilege in any intermediary with shared admin secrets.
1990
01:50:54,760 –> 01:50:56,160
Quarantine is not a guess.
1991
01:50:56,160 –> 01:51:00,040
It is a playbook per tier with business owners already listed.
1992
01:51:00,040 –> 01:51:02,840
We notify humans using language they own.
1993
01:51:02,840 –> 01:51:07,600
Your server is in protective isolation for a probable credential event.
1994
01:51:07,600 –> 01:51:09,840
Estimated disruption, 20 minutes.
1995
01:51:09,840 –> 01:51:13,080
Rollback path, restart service X post release.
1996
01:51:13,080 –> 01:51:14,840
We revoke what was minted.
1997
01:51:14,840 –> 01:51:20,360
Kerberos tokens can be curtailed by log off or ticket purge on endpoints and when needed
1998
01:51:20,360 –> 01:51:26,800
by disabling the account at the directory and forcing reauthentication across the field.
1999
01:51:26,800 –> 01:51:30,040
For NTLM pressure, we close channels.
2000
01:51:30,040 –> 01:51:37,120
Block relay paths by enforcing SMB signing, raise LDAP channel binding and disable the
2001
01:51:37,120 –> 01:51:41,240
print spooler reflex on servers that should never coerce.
2002
01:51:41,240 –> 01:51:48,360
We prefer surgical moves, deny a firewall rule, block a source, before global toggles
2003
01:51:48,360 –> 01:51:50,200
that turn business into noise.
2004
01:51:50,200 –> 01:51:53,440
We sequence secret resets.
2005
01:51:53,440 –> 01:51:59,320
Service accounts first, especially those with SPNs tied to sensitive services, then admins
2006
01:51:59,320 –> 01:52:01,560
who touched the suspected nodes.
2007
01:52:01,560 –> 01:52:06,240
Then if we see 4.6 and 6.2 for replication or evidence of directory theft, we plan
2008
01:52:06,240 –> 01:52:12,400
to check the CT-RBT-GT rotations twice, timed with replication health checks.
2009
01:52:12,400 –> 01:52:14,160
Rotation without health is drift.
2010
01:52:14,160 –> 01:52:16,320
We keep a checklist.
2011
01:52:16,320 –> 01:52:21,800
Replication state, DC health, ticket lifetimes, two rotations spaced by ticket max lifetime
2012
01:52:21,800 –> 01:52:25,720
confirm no lingering TGTs verify client trust.
2013
01:52:25,720 –> 01:52:28,680
We hunt persistence while the room is quieted.
2014
01:52:28,680 –> 01:52:36,160
We collect auto runs, schedule tasks, recent services, new local admins, WMI subscriptions,
2015
01:52:36,160 –> 01:52:44,360
we capture volatile artifacts, memory, if lawful, active connections, unusual handles, and
2016
01:52:44,360 –> 01:52:50,280
we tag what is found with a case ID so future alerts join the same constellation.
2017
01:52:50,280 –> 01:52:53,400
If the host touched here, we rebuilt.
2018
01:52:53,400 –> 01:52:56,480
Cleansing rituals are for edges, not the core.
2019
01:52:56,480 –> 01:52:58,400
Communication is oxygen.
2020
01:52:58,400 –> 01:53:04,600
We keep leadership close with truths, not theatre, incident stage, affected scope, confidence
2021
01:53:04,600 –> 01:53:07,840
levels, estimated impact, next decision.
2022
01:53:07,840 –> 01:53:14,560
We time bound decisions, contain within minutes, reset within hours, rebuild within days.
2023
01:53:14,560 –> 01:53:15,960
We mark the horizon.
2024
01:53:15,960 –> 01:53:21,080
If exocurs we escalate to forest recovery steps, the plan exists before the need.
2025
01:53:21,080 –> 01:53:24,080
The observer speaks, I am the fabric, I will not scream.
2026
01:53:24,080 –> 01:53:27,320
I will whisper, then hum, then shudder.
2027
01:53:27,320 –> 01:53:30,200
If you listen early, containment is a conversation.
2028
01:53:30,200 –> 01:53:32,640
If you wait, it becomes gravity.
2029
01:53:32,640 –> 01:53:34,400
Low chime.
2030
01:53:34,400 –> 01:53:41,000
Stability is suppressed, tokens purged, 4.769 returns to baseline.
2031
01:53:41,000 –> 01:53:47,200
Base pulse recedes, the orbit holds because listening preceded action.
2032
01:53:47,200 –> 01:53:52,000
While building a stable orbit, stability is not stasis, it is motion bound by law.
2033
01:53:52,000 –> 01:53:57,360
We will codify law into baselines that behave like a physics engine, tiered administration
2034
01:53:57,360 –> 01:54:01,880
and privileged access workstations that separate mass.
2035
01:54:01,880 –> 01:54:07,200
Let us say protection, credential guard and SMB signing that hardened boundaries.
2036
01:54:07,200 –> 01:54:12,280
NTLM confined to glass cases with channel binding and allow lists.
2037
01:54:12,280 –> 01:54:19,640
Kerberos, governed by disciplined delegation, SP and hygiene, pack validation and KRBTGT
2038
01:54:19,640 –> 01:54:22,240
rotation as ritual.
2039
01:54:22,240 –> 01:54:28,920
We will make operations a metronome, patch cadence with cohorts, exception sunsets and
2040
01:54:28,920 –> 01:54:32,080
dashboards that show time where it slows.
2041
01:54:32,080 –> 01:54:38,040
Backups that are real because restore succeed in labs and forests, recover on schedule.
2042
01:54:38,040 –> 01:54:41,440
Drills that turn fear into competence.
2043
01:54:41,440 –> 01:54:44,800
We will define governance that refuses drift.
2044
01:54:44,800 –> 01:54:50,360
Owners for every service principle, rotations as calendars, GPO as ceremony, monitoring
2045
01:54:50,360 –> 01:54:54,680
as music and detections tune to chords rather than single notes.
2046
01:54:54,680 –> 01:54:55,680
Low chime.
2047
01:54:55,680 –> 01:54:56,880
The map still holds.
2048
01:54:56,880 –> 01:54:58,880
We are not seeking perfection.
2049
01:54:58,880 –> 01:55:05,360
We are choosing orbit, the baseline, laws of your universe, law is not flare, it is gravity
2050
01:55:05,360 –> 01:55:06,360
you can trust.
2051
01:55:06,360 –> 01:55:09,520
We begin with boundaries.
2052
01:55:09,520 –> 01:55:14,200
Tiered administration is not a chart, it is distance.
2053
01:55:14,200 –> 01:55:23,760
Tier governs identity itself, domain controllers, forest route, PKI, AAD connect, identity orchestration.
2054
01:55:23,760 –> 01:55:31,640
Tier one sustains enterprise services, application servers, SQL, file and print where permitted.
2055
01:55:31,640 –> 01:55:35,240
Tier two hosts people, workstations, VDI pools.
2056
01:55:35,240 –> 01:55:38,520
We refuse crossings except through sanctioned gates.
2057
01:55:38,520 –> 01:55:40,520
A tier two device never reaches tier.
2058
01:55:40,520 –> 01:55:44,760
A tier one admin never holds standing rights in tier.
2059
01:55:44,760 –> 01:55:47,520
Distance becomes safety.
2060
01:55:47,520 –> 01:55:49,400
Privileged access.
2061
01:55:49,400 –> 01:55:52,880
Workstations are vessels built to resist heat.
2062
01:55:52,880 –> 01:55:56,280
They serve one purpose to administer tier or tier one safely.
2063
01:55:56,280 –> 01:55:59,840
No email, no browsing, no plugins.
2064
01:55:59,840 –> 01:56:01,040
Application control on.
2065
01:56:01,040 –> 01:56:03,800
A tax service reduced.
2066
01:56:03,800 –> 01:56:07,200
Credential guard and LSA protection enabled.
2067
01:56:07,200 –> 01:56:11,400
Remote credential guard for RDP so secrets do not land on destinations.
2068
01:56:11,400 –> 01:56:15,600
If an admin must touch the core, this is the only ship allowed to approach.
2069
01:56:15,600 –> 01:56:19,160
We encode posture in baselines, not folklore.
2070
01:56:19,160 –> 01:56:21,840
Group policy becomes the constitution.
2071
01:56:21,840 –> 01:56:32,600
For tier and PR abuse, we enforce LSA protection, run ASPPL so LSASS is not a casual library.
2072
01:56:32,600 –> 01:56:35,960
Credential guard to lift secrets out of ordinary memory.
2073
01:56:35,960 –> 01:56:40,240
SMB signing always so relays cannot mimic proximity.
2074
01:56:40,240 –> 01:56:43,080
LDAP channel binding required.
2075
01:56:43,080 –> 01:56:46,160
NTL MV1 and LM disabled.
2076
01:56:46,160 –> 01:56:50,480
NTLM auditing turned to light the caves we still carry.
2077
01:56:50,480 –> 01:56:52,080
Kerberos hardening.
2078
01:56:52,080 –> 01:56:53,080
Fast.
2079
01:56:53,080 –> 01:56:54,080
We’re supported.
2080
01:56:54,080 –> 01:56:55,080
P.A.K.
2081
01:56:55,080 –> 01:56:57,720
Validation for sensitive services.
2082
01:56:57,720 –> 01:57:02,880
Constraint or resource-based delegation only by exception with Calbee approval.
2083
01:57:02,880 –> 01:57:05,720
Print spoolers stopped on servers that do not print.
2084
01:57:05,720 –> 01:57:07,960
On DCs always stopped.
2085
01:57:07,960 –> 01:57:08,760
W.D.I.
2086
01:57:08,760 –> 01:57:09,760
Gest.
2087
01:57:09,760 –> 01:57:10,760
Disabled.
2088
01:57:10,760 –> 01:57:15,000
Restricted admin mode for RDP considered where feasible.
2089
01:57:15,000 –> 01:57:16,880
Remote UAC enabled.
2090
01:57:16,880 –> 01:57:22,200
So local admin tokens do not cross privilege boundaries without intent.
2091
01:57:22,200 –> 01:57:24,720
Identity becomes ceremony.
2092
01:57:24,720 –> 01:57:27,440
Administrative roles are tools, not personas.
2093
01:57:27,440 –> 01:57:29,040
We carry separate accounts.
2094
01:57:29,040 –> 01:57:35,320
A human identity for daily work, scoped admin identities per tier, and break glass accounts,
2095
01:57:35,320 –> 01:57:40,960
sealed with hardware factors and offline procedures tested in drills.
2096
01:57:40,960 –> 01:57:44,080
Protected users for those who should never speak fossil dialects.
2097
01:57:44,080 –> 01:57:50,200
MFA at the first gate where identity is minted, not the last gate where damage is done.
2098
01:57:50,200 –> 01:57:52,560
Service accounts are vessels with ownership.
2099
01:57:52,560 –> 01:57:55,200
We default to managed service accounts.
2100
01:57:55,200 –> 01:57:58,880
SMSA for single host, GMSA for farms.
2101
01:57:58,880 –> 01:58:01,400
To rotate keys as hard beat.
2102
01:58:01,400 –> 01:58:02,920
We’re not possible.
2103
01:58:02,920 –> 01:58:05,680
Secrets are long and scheduled to change.
2104
01:58:05,680 –> 01:58:07,480
Rotation is scripted and logged.
2105
01:58:07,480 –> 01:58:10,960
Deny interactive logon to all service principles.
2106
01:58:10,960 –> 01:58:15,040
Deny RDP deny logon locally.
2107
01:58:15,040 –> 01:58:18,200
Scope logon is a service to exact hosts.
2108
01:58:18,200 –> 01:58:20,400
SPN rights are rare.
2109
01:58:20,400 –> 01:58:27,360
Assigned via a change request, reviewed quarterly, and removed when a workload retires.
2110
01:58:27,360 –> 01:58:32,040
Delegation lives under constraint with precision, resource-based where possible.
2111
01:58:32,040 –> 01:58:37,480
Target lists exact, never wild cards, never CFs, those.
2112
01:58:37,480 –> 01:58:39,600
We keep software finite.
2113
01:58:39,600 –> 01:58:43,680
Network images for workstations and servers reduce novelty.
2114
01:58:43,680 –> 01:58:44,920
Application control.
2115
01:58:44,920 –> 01:58:49,760
WDC or a blocker on pause, domain controllers and tier systems.
2116
01:58:49,760 –> 01:58:51,160
So only signed.
2117
01:58:51,160 –> 01:58:52,680
Known binaries execute.
2118
01:58:52,680 –> 01:58:58,400
PowerShell runs with transcription and constrained language on endpoints where risk warrants.
2119
01:58:58,400 –> 01:59:02,080
On PRDU’s it remains full power with logging that sings.
2120
01:59:02,080 –> 01:59:06,440
Sysmon deployed with a curated rule set to lift process ancestry.
2121
01:59:06,440 –> 01:59:12,600
PowerShell writes, network lines and module loads into language the CM can read.
2122
01:59:12,600 –> 01:59:13,600
We do not drown.
2123
01:59:13,600 –> 01:59:16,320
We teach the telescope which stars matter.
2124
01:59:16,320 –> 01:59:18,520
Network is architecture, not water.
2125
01:59:18,520 –> 01:59:22,240
East, west is segmented to reflect tiers.
2126
01:59:22,240 –> 01:59:26,600
Workstations do not win RM into servers by default.
2127
01:59:26,600 –> 01:59:29,240
Servers do not RDP into controllers.
2128
01:59:29,240 –> 01:59:33,480
Only jump hosts on a management VLAN may cross with privilege.
2129
01:59:33,480 –> 01:59:38,040
Airwall baselines deny by default, allow by purpose.
2130
01:59:38,040 –> 01:59:45,880
SMB signing enforced, legacy protocols, SMBV1 unsigned RPC retired.
2131
01:59:45,880 –> 01:59:52,760
Edge paths to legacy caves pass through inspection, application proxies that require modern authentication,
2132
01:59:52,760 –> 01:59:59,440
TLS termination with mutual trust and logging that records each crossing like a border stamp.
2133
01:59:59,440 –> 02:00:00,760
Time is law.
2134
02:00:00,760 –> 02:00:03,040
Patch cadence is a metronome.
2135
02:00:03,040 –> 02:00:09,080
Things of hosts patch in cohorts with dashboards that display age, exceptions and sunsets,
2136
02:00:09,080 –> 02:00:13,600
exceptions require owners, business justification and a date of death.
2137
02:00:13,600 –> 02:00:17,280
Technical debt measured in days, not feelings.
2138
02:00:17,280 –> 02:00:20,520
Legacy nodes that cannot comply move to isolation.
2139
02:00:20,520 –> 02:00:27,440
Philans with sparse rules, no admin ingress except bastions, telemetry amplified.
2140
02:00:27,440 –> 02:00:33,000
Retirement aligns budget to gravity, reduce blast radius first, then eliminate mass.
2141
02:00:33,000 –> 02:00:36,000
Backups are not wishful, they are recoverable.
2142
02:00:36,000 –> 02:00:41,480
Domain controllers backup system state on rotation, forest recovery is rehearsed.
2143
02:00:41,480 –> 02:00:47,240
Authoritative restore practice, metadata cleanup, tombstone windows understood,
2144
02:00:47,240 –> 02:00:49,240
sysval health verified.
2145
02:00:49,240 –> 02:00:55,000
A restored controller must be trusted by fresh clients without manual blessing.
2146
02:00:55,000 –> 02:00:59,080
Until that sentence is true, backups are theater.
2147
02:00:59,080 –> 02:01:06,960
KRBTGT rotation becomes ritual twice spaced by maximum ticket lifetime on a cadence and
2148
02:01:06,960 –> 02:01:09,600
again after compromise.
2149
02:01:09,600 –> 02:01:10,600
Certificates have owners.
2150
02:01:10,600 –> 02:01:16,400
ADCS templates are policed, enrollment rights are narrow, audit trails are forwarded
2151
02:01:16,400 –> 02:01:17,560
of the CA.
2152
02:01:17,560 –> 02:01:20,560
We set detection as constitutional music.
2153
02:01:20,560 –> 02:01:22,520
Security logs forward.
2154
02:01:22,520 –> 02:01:36,200
4768 4769 4672 4662 for replication 4728 4732 group changes.
2155
02:01:36,200 –> 02:01:39,440
745 service installs.
2156
02:01:39,440 –> 02:01:40,840
Sysman sings.
2157
02:01:40,840 –> 02:01:47,960
One for process trees, three for beams, seven for modules, ten for LSAS access, eleven
2158
02:01:47,960 –> 02:01:50,960
for file placements in system paths.
2159
02:01:50,960 –> 02:01:58,480
CM correlation, favors courts, privileged logon plus SPN spike plus new service equals
2160
02:01:58,480 –> 02:02:00,880
gravity failure.
2161
02:02:00,880 –> 02:02:05,400
Alerts map to playbooks with owners, timescails and business narratives.
2162
02:02:05,400 –> 02:02:08,280
Silence is the exception, not the plan.
2163
02:02:08,280 –> 02:02:12,920
Humans complete the orbit, change requires tickets, tickets carry context.
2164
02:02:12,920 –> 02:02:14,680
Context is preserved in logs.
2165
02:02:14,680 –> 02:02:18,920
Cabe is not theater, it is friction that prevents heat.
2166
02:02:18,920 –> 02:02:20,600
Things speaks physics.
2167
02:02:20,600 –> 02:02:27,280
Why we refuse, N-T-L-M, why PA use matter, why delegation is a lens.
2168
02:02:27,280 –> 02:02:29,840
Microdrill’s test one control monthly.
2169
02:02:29,840 –> 02:02:38,720
A blocked RDP from tier 2, a denied SPN right, a simulated 4662 DC sync alarm, culture becomes
2170
02:02:38,720 –> 02:02:40,040
memory.
2171
02:02:40,040 –> 02:02:41,640
Memory becomes reflex.
2172
02:02:41,640 –> 02:02:43,040
The observer speaks.
2173
02:02:43,040 –> 02:02:45,280
I am the universe you govern.
2174
02:02:45,280 –> 02:02:48,840
When law is encoded, drift must argue with code, not habit.
2175
02:02:48,840 –> 02:02:52,360
When ceremony meets privilege, gravity holds.
2176
02:02:52,360 –> 02:02:57,720
Low chime, the baseline is not glamour, it is survival, written as law.
2177
02:02:57,720 –> 02:02:59,000
Operational gravity.
2178
02:02:59,000 –> 02:03:01,600
Patching, backups, drills.
2179
02:03:01,600 –> 02:03:05,160
Operations is where law meets time.
2180
02:03:05,160 –> 02:03:09,560
Gravity without cadence decays, we set a metronome and refuse to argue with it.
2181
02:03:09,560 –> 02:03:12,880
Patching is not a task, it is orbital correction.
2182
02:03:12,880 –> 02:03:21,680
We group hosts into cohorts that reflect risk and blast radius, tier 1, tier 1, tier 2.
2183
02:03:21,680 –> 02:03:27,320
Each cohort patches on a predictable rhythm, monthly for the living, ad hoc for emergencies,
2184
02:03:27,320 –> 02:03:33,160
quarterly for legacy islands that cannot move faster, with dashboards that display age
2185
02:03:33,160 –> 02:03:35,400
like redshift.
2186
02:03:35,400 –> 02:03:41,680
Exceptions exist, but they are mortal, a justification, an owner, an expiration date embedded
2187
02:03:41,680 –> 02:03:42,680
in the ticket.
2188
02:03:42,680 –> 02:03:46,760
When the date arrives, the universe does not ask, it enforces.
2189
02:03:46,760 –> 02:03:49,160
We reduce panic by rehearsal.
2190
02:03:49,160 –> 02:03:54,680
Before patch Tuesday becomes patch reality, we stage in a lab that reflects production’s
2191
02:03:54,680 –> 02:04:00,840
constellations, DCs, PDUs, representative application servers, a handful of workstations.
2192
02:04:00,840 –> 02:04:07,560
We snapshot, we apply, we test authentication, delegation and line of business flows.
2193
02:04:07,560 –> 02:04:12,640
If a patch bends Kerberos or breaks SMB signing, we learn it under safe service.
2194
02:04:12,640 –> 02:04:15,560
Starlight, not during business dawn.
2195
02:04:15,560 –> 02:04:17,320
Canary rings follow.
2196
02:04:17,320 –> 02:04:22,880
10 machines per cohort observed for 24 hours, then the wave rolls.
2197
02:04:22,880 –> 02:04:25,240
Legacy is handled with physics, not hope.
2198
02:04:25,240 –> 02:04:31,120
When a system cannot absorb modern updates, we pin it to an isolation arc, dedicated VLAN,
2199
02:04:31,120 –> 02:04:38,160
minimal inbound, no outbound, except to named services, telemetry amplified.
2200
02:04:38,160 –> 02:04:45,480
We schedule compensating updates, drivers, middleware, agent refreshes, that reduce surface,
2201
02:04:45,480 –> 02:04:47,160
even if the OS sits still.
2202
02:04:47,160 –> 02:04:49,360
We lock the dead in days, the count is public.
2203
02:04:49,360 –> 02:04:51,120
Time shames drift.
2204
02:04:51,120 –> 02:04:53,160
Backups are memory with ritual.
2205
02:04:53,160 –> 02:04:56,640
Domain controllers carry system state like a black box.
2206
02:04:56,640 –> 02:05:01,360
We take it on schedule, daily or more for tier, and we send it off the ship.
2207
02:05:01,360 –> 02:05:06,960
Immutable storage with retention that matches regulatory gravity and recovery reality.
2208
02:05:06,960 –> 02:05:10,120
But a backup untested is a story, not truth.
2209
02:05:10,120 –> 02:05:12,840
We restore a DC in a lab every quarter.
2210
02:05:12,840 –> 02:05:18,320
We booted clean, verify SwissVolHealth, confirm replication, and watch a new client trusted
2211
02:05:18,320 –> 02:05:20,040
without manual blessing.
2212
02:05:20,040 –> 02:05:23,560
If any step requires a prayer, we fix the script.
2213
02:05:23,560 –> 02:05:26,000
Forest Recovery is choreography.
2214
02:05:26,000 –> 02:05:28,800
We keep a runbook that names each movement.
2215
02:05:28,800 –> 02:05:31,120
Isolate Compromise DCs.
2216
02:05:31,120 –> 02:05:38,720
These FSMO roles to a trusted survivor, metadata cleanup to erase ghosts, build fresh DCs
2217
02:05:38,720 –> 02:05:45,000
from known good, signed media, restore system state if needed, reintroduce replication with
2218
02:05:45,000 –> 02:05:52,880
health checks, rotate KRBTGT twice, spaced by the maximum ticket lifetime, confirm client
2219
02:05:52,880 –> 02:05:54,520
logons at scale.
2220
02:05:54,520 –> 02:05:56,160
Names are attached to each step.
2221
02:05:56,160 –> 02:05:58,200
Phone numbers live on paper and offline.
2222
02:05:58,200 –> 02:06:01,840
We measure the rehearsal in minutes and hours, not anecdotes.
2223
02:06:01,840 –> 02:06:03,680
We backup more than controllers.
2224
02:06:03,680 –> 02:06:05,680
ADCS has its own heart.
2225
02:06:05,680 –> 02:06:08,960
CA database, private keys, templates logs.
2226
02:06:08,960 –> 02:06:12,480
We export and protect them with the same reverence.
2227
02:06:12,480 –> 02:06:17,680
If certificates define who can enter the room, losing a CA is losing the door.
2228
02:06:17,680 –> 02:06:21,600
We also backup GPOs as objects and as files.
2229
02:06:21,600 –> 02:06:25,960
When law corrupts, we restore law, not guesswork.
2230
02:06:25,960 –> 02:06:30,120
And secrets tied to service accounts get their own vault backups.
2231
02:06:30,120 –> 02:06:34,440
Version access logged, recoverable without who remembers the password.
2232
02:06:34,440 –> 02:06:36,520
Drills turn fear into competence.
2233
02:06:36,520 –> 02:06:37,760
Tabletop first.
2234
02:06:37,760 –> 02:06:39,960
A story told with clocks.
2235
02:06:39,960 –> 02:06:49,800
At 0211 event 4672 files on DC02 at 02144662 signals DC sync by SVC backup west.
2236
02:06:49,800 –> 02:06:52,280
At 0217 change window is dark.
2237
02:06:52,280 –> 02:06:56,160
[INFORMATION]
2238
02:06:56,160 –> 02:06:58,760
We ask who calls whom?
2239
02:06:58,760 –> 02:07:00,360
What gets quarantined?
2240
02:07:00,360 –> 02:07:02,320
Which secrets reset first?
2241
02:07:02,320 –> 02:07:04,320
Which services fail over?
2242
02:07:04,320 –> 02:07:08,720
Which business owners need to hear plain language in five minutes?
2243
02:07:08,720 –> 02:07:11,320
Rolls practice words, playbooks practice order.
2244
02:07:11,320 –> 02:07:13,160
Then lifefire scoped and safe.
2245
02:07:13,160 –> 02:07:16,080
Pull a Canary DC offline in the lab and simulate loss.
2246
02:07:16,080 –> 02:07:17,360
Rebuild it to the runbook.
2247
02:07:17,360 –> 02:07:19,440
Reset KRBTGT twice with timers.
2248
02:07:19,440 –> 02:07:23,680
Verify pack validation on a sensitive service catches injected claims.
2249
02:07:23,680 –> 02:07:27,880
Reissue a GMSA and watch dependent services stumble, then recover.
2250
02:07:27,880 –> 02:07:32,440
Measure not perfection, but time to stable orbit.
2251
02:07:32,440 –> 02:07:38,880
Each drill ends with edits to law, a missing phone number, an ambiguous approval, a step that
2252
02:07:38,880 –> 02:07:42,720
took hours because two teams spoke different dialects.
2253
02:07:42,720 –> 02:07:45,200
Lab echo, low chime.
2254
02:07:45,200 –> 02:07:51,920
Backup validation, SISVOL restored, DFSR healthy, clients trust.
2255
02:07:51,920 –> 02:07:57,400
Soft tick, KRBTGT rotation, pass one complete timer set for pass two.
2256
02:07:57,400 –> 02:07:59,480
The metronome is audible.
2257
02:07:59,480 –> 02:08:01,120
Monitoring confirms cadence.
2258
02:08:01,120 –> 02:08:06,120
Dashboards show patch H by tier, percentage compliant.
2259
02:08:06,120 –> 02:08:08,120
Exceptions expiring this week.
2260
02:08:08,120 –> 02:08:14,600
Backups report last success timestamps, restore tests with pass, fail, next drill scheduled.
2261
02:08:14,600 –> 02:08:16,120
We page on silence.
2262
02:08:16,120 –> 02:08:20,560
If no system state landed last night, that is an incident.
2263
02:08:20,560 –> 02:08:25,400
If KRBTGT has not rotated in 12 months, that is drift declared.
2264
02:08:25,400 –> 02:08:31,320
If a tier-poor runs a browser, plug in update, that is noise made into signal.
2265
02:08:31,320 –> 02:08:33,920
Culture anchors the orbit.
2266
02:08:33,920 –> 02:08:36,520
Change windows are real.
2267
02:08:36,520 –> 02:08:38,640
Leadership defends them.
2268
02:08:38,640 –> 02:08:44,380
Admins are rewarded for boring updates that land on time, not heroic saves at sunrise.
2269
02:08:44,380 –> 02:08:47,580
Most incident reviews target process, not people.
2270
02:08:47,580 –> 02:08:51,000
The physics that failed, the law we revised.
2271
02:08:51,000 –> 02:08:54,340
Vendors are negotiated with as if physics matters.
2272
02:08:54,340 –> 02:08:59,540
Support for GMSA, channel binding, SMB signing.
2273
02:08:59,540 –> 02:09:04,780
Contracts include modernization clauses, sunsets and penalties for fossil gravity.
2274
02:09:04,780 –> 02:09:06,380
The observer speaks.
2275
02:09:06,380 –> 02:09:08,360
I am the clock in your sky.
2276
02:09:08,360 –> 02:09:11,420
When you keep cadence, I do not punish.
2277
02:09:11,420 –> 02:09:14,640
When you drift, I stretch your hours into nights.
2278
02:09:14,640 –> 02:09:20,080
Low chime, patches land, backups restore, drills remember.
2279
02:09:20,080 –> 02:09:24,080
Operational gravity holds because time is governed, not feared.
2280
02:09:24,080 –> 02:09:27,700
Governance checklist, Monday, gravity.
2281
02:09:27,700 –> 02:09:31,660
Before we drift apart, here is the gravity you must enforce.
2282
02:09:31,660 –> 02:09:37,340
Not theory, action, Monday, one, domain controllers are sacred, no casual logo, no browsing,
2283
02:09:37,340 –> 02:09:39,380
no email, no, just for a minute.
2284
02:09:39,380 –> 02:09:44,180
And force deny interactive logon for everyone not in tier admin roles.
2285
02:09:44,180 –> 02:09:48,860
Stop the print spooler, require PA use for administration with remote credential guard.
2286
02:09:48,860 –> 02:09:53,380
LSA protection enabled, credential guard where supported, law at the core.
2287
02:09:53,380 –> 02:09:57,100
Two, admin is a tool, not a person.
2288
02:09:57,100 –> 02:09:58,620
Carry separate identities.
2289
02:09:58,620 –> 02:10:01,060
User tier one admin, tier admin.
2290
02:10:01,060 –> 02:10:05,380
Protect them with hardware backed factors and policies that refuse NTLM.
2291
02:10:05,380 –> 02:10:11,380
Note tier admins in the protected users group, remove lingering logon locally and RDP
2292
02:10:11,380 –> 02:10:15,380
rights from admin accounts everywhere except jump posts.
2293
02:10:15,380 –> 02:10:17,380
Ceremony, not convenience.
2294
02:10:17,380 –> 02:10:20,380
Three, reduce fossil gravity.
2295
02:10:20,380 –> 02:10:23,780
Disable LM and NTLMV one entirely.
2296
02:10:23,780 –> 02:10:29,380
Audit NTLM to discover remaining caves and force SMB signing on clients and service.
2297
02:10:29,380 –> 02:10:36,660
Why are LDAP channel binding prefer Kerberos with precise SPNs where NTLM must remain a
2298
02:10:36,660 –> 02:10:41,380
laulist service and isolate them in a VLAN that cannot touch tier.
2299
02:10:41,380 –> 02:10:43,380
Fossils behind glass.
2300
02:10:43,380 –> 02:10:46,900
Four, delegation becomes engineered light.
2301
02:10:46,900 –> 02:10:49,580
Remove unconstrained delegation.
2302
02:10:49,580 –> 02:10:54,220
Replace with constrained delegation scoped to exact SPNs.
2303
02:10:54,220 –> 02:10:59,740
Rear resource based constrained delegation so targets choose their mirrors.
2304
02:10:59,740 –> 02:11:02,860
Deny interactive logon to every service account.
2305
02:11:02,860 –> 02:11:09,100
If a vendor demands an exception, place it behind glass with WDAS or app locker, transcript
2306
02:11:09,100 –> 02:11:11,700
logging and change control.
2307
02:11:11,700 –> 02:11:14,940
Five, service accounts are vessels with owners.
2308
02:11:14,940 –> 02:11:17,140
Default to GMSA and SMSA.
2309
02:11:17,140 –> 02:11:23,820
Rotate as heartbeat for any static secret and force length and scheduled rotation.
2310
02:11:23,820 –> 02:11:26,180
Distric logon writes to exact hosts.
2311
02:11:26,180 –> 02:11:29,420
Remove SPN right permissions from broad groups.
2312
02:11:29,420 –> 02:11:32,500
Make SPN creation a ticketed event.
2313
02:11:32,500 –> 02:11:33,820
Quarterly a test.
2314
02:11:33,820 –> 02:11:35,580
Owner purpose writes.
2315
02:11:35,580 –> 02:11:37,260
Last rotate date.
2316
02:11:37,260 –> 02:11:38,420
Delegation targets.
2317
02:11:38,420 –> 02:11:40,820
Six, laps everywhere.
2318
02:11:40,820 –> 02:11:45,300
Unique local administrator passwords on every workstation and server.
2319
02:11:45,300 –> 02:11:46,500
Rotate regularly.
2320
02:11:46,500 –> 02:11:51,660
Deny reading laps attributes to anyone outside a small audited group.
2321
02:11:51,660 –> 02:11:56,620
Share with remote UAC so local admin tokens do not cross boundaries without intent.
2322
02:11:56,620 –> 02:11:58,620
Shared local admin dies today.
2323
02:11:58,620 –> 02:12:00,540
Seven, segment east west.
2324
02:12:00,540 –> 02:12:03,740
Workstations cannot win RM to servers by default.
2325
02:12:03,740 –> 02:12:06,780
Service cannot RDP to domain controllers.
2326
02:12:06,780 –> 02:12:12,620
Only jump hosts in a management VLAN may cross to tier and tier one.
2327
02:12:12,620 –> 02:12:17,780
Deny by default allow by purpose validate rules with flow logs.
2328
02:12:17,780 –> 02:12:22,100
Every unexpected beam is an alert not a trivia question.
2329
02:12:22,100 –> 02:12:24,500
Eight, baselines are law.
2330
02:12:24,500 –> 02:12:26,900
Apply hardened GPO’s.
2331
02:12:26,900 –> 02:12:28,740
LSA protection.
2332
02:12:28,740 –> 02:12:29,740
Credential guard.
2333
02:12:29,740 –> 02:12:32,020
SMB signing always.
2334
02:12:32,020 –> 02:12:34,820
LDAP channel binding required.
2335
02:12:34,820 –> 02:12:37,140
WDIGEST disabled.
2336
02:12:37,140 –> 02:12:40,460
Print spooler off on servers that do not print.
2337
02:12:40,460 –> 02:12:42,660
Legacy protocols removed.
2338
02:12:42,660 –> 02:12:45,740
Power shell logging and transcription where risk demands.
2339
02:12:45,740 –> 02:12:48,540
Disment deployed with a curated rule set.
2340
02:12:48,540 –> 02:12:52,820
Application control on PAW’s, DC’s, tier servers.
2341
02:12:52,820 –> 02:12:54,980
Nine, Kerberos lives with ritual.
2342
02:12:54,980 –> 02:13:00,260
Rotate KRBT GT twice on a planned cadence and after compromise.
2343
02:13:00,260 –> 02:13:03,060
Short and ticket lifetimes for high value identities.
2344
02:13:03,060 –> 02:13:06,780
Enable pack validation on sensitive services that support it.
2345
02:13:06,780 –> 02:13:09,220
Audit for duplicate or stale SPNs.
2346
02:13:09,220 –> 02:13:11,420
Remove wild card targets in delegation.
2347
02:13:11,420 –> 02:13:13,380
Kerberos armoring where feasible.
2348
02:13:13,380 –> 02:13:14,700
Time aligned to keys.
2349
02:13:14,700 –> 02:13:16,380
In monitor codes not notes.
2350
02:13:16,380 –> 02:13:22,980
Forward 4768 4769 4672 4662 replication.
2351
02:13:22,980 –> 02:13:31,020
4728 4729 4732 4733 7-045 474.
2352
02:13:31,020 –> 02:13:33,300
Collect system 137 10 11.
2353
02:13:33,300 –> 02:13:35,300
Build correlations.
2354
02:13:35,300 –> 02:13:42,260
Privileged logon plus SPN spike plus new service equals page now.
2355
02:13:42,260 –> 02:13:45,540
Tag hosts by tier and patch age.
2356
02:13:45,540 –> 02:13:49,500
Weight alerts by blast radius.
2357
02:13:49,500 –> 02:13:51,500
Silence is drift 11.
2358
02:13:51,500 –> 02:13:52,700
Patch by metronome.
2359
02:13:52,700 –> 02:13:54,180
Cohorts by tier.
2360
02:13:54,180 –> 02:13:55,180
Canary.
2361
02:13:55,180 –> 02:13:56,180
Then wave.
2362
02:13:56,180 –> 02:13:57,980
Exceptions expire by date.
2363
02:13:57,980 –> 02:13:59,180
Dashboards show age.
2364
02:13:59,180 –> 02:14:02,140
Isolation for nodes that cannot comply.
2365
02:14:02,140 –> 02:14:06,420
Legacy paths behind proxies with mutual TLS.
2366
02:14:06,420 –> 02:14:08,100
Compensate loudly.
2367
02:14:08,100 –> 02:14:12,580
Dimitri amplified firewall rules strict time is governance.
2368
02:14:12,580 –> 02:14:15,860
12 backups are real or they are fantasy.
2369
02:14:15,860 –> 02:14:18,340
System stayed for every DC on schedule.
2370
02:14:18,340 –> 02:14:20,420
Off the box immutable.
2371
02:14:20,420 –> 02:14:25,580
Quarterly lab restore that ends with a new client trusting the restored DC without manual
2372
02:14:25,580 –> 02:14:26,580
blessing.
2373
02:14:26,580 –> 02:14:30,460
ADCS database and keys backed up and tested.
2374
02:14:30,460 –> 02:14:32,260
GPOs exported.
2375
02:14:32,260 –> 02:14:33,500
Runbook printed.
2376
02:14:33,500 –> 02:14:35,060
Phone numbers verified.
2377
02:14:35,060 –> 02:14:36,540
Rolls rehearsed.
2378
02:14:36,540 –> 02:14:38,180
14. Practice the fall.
2379
02:14:38,180 –> 02:14:39,660
Tabletop quarterly.
2380
02:14:39,660 –> 02:14:41,820
Live fire in lab twice a year.
2381
02:14:41,820 –> 02:14:42,820
Rebuild a DC.
2382
02:14:42,820 –> 02:14:45,060
Rotate KRBTGT twice.
2383
02:14:45,060 –> 02:14:47,060
Reissue a GMSA.
2384
02:14:47,060 –> 02:14:49,620
Validate pack checks measure time to stable orbit.
2385
02:14:49,620 –> 02:14:51,260
Edit law after every drill.
2386
02:14:51,260 –> 02:14:54,260
The universe respects rehearsal.
2387
02:14:54,260 –> 02:14:56,420
14.
2388
02:14:56,420 –> 02:14:57,900
Name owners.
2389
02:14:57,900 –> 02:14:58,900
Every GPO.
2390
02:14:58,900 –> 02:15:00,220
Every service principle.
2391
02:15:00,220 –> 02:15:01,620
Every certificate template.
2392
02:15:01,620 –> 02:15:04,380
Every firewall zone.
2393
02:15:04,380 –> 02:15:05,500
Ownership in a registry.
2394
02:15:05,500 –> 02:15:07,900
Humans can read a test quarterly.
2395
02:15:07,900 –> 02:15:10,180
Orphans are retired not tolerated.
2396
02:15:10,180 –> 02:15:12,940
Dead stars still bend light until removed.
2397
02:15:12,940 –> 02:15:13,940
15.
2398
02:15:13,940 –> 02:15:14,940
Close the coercions.
2399
02:15:14,940 –> 02:15:18,020
Disable the print spooler where unnecessary.
2400
02:15:18,020 –> 02:15:19,780
Retire SMBV1.
2401
02:15:19,780 –> 02:15:22,660
Restrict NTLM relay by signing and channel binding.
2402
02:15:22,660 –> 02:15:25,580
Reduce implicit trust in management protocols.
2403
02:15:25,580 –> 02:15:31,260
Every coercion trimmed is one less tied, dragging identity outward.
2404
02:15:31,260 –> 02:15:32,940
16.
2405
02:15:32,940 –> 02:15:37,100
Vendors with physics change windows defended by leadership.
2406
02:15:37,100 –> 02:15:41,180
Incident language plane scope confidence impact next decision.
2407
02:15:41,180 –> 02:15:43,300
Reward boring success on time.
2408
02:15:43,300 –> 02:15:44,980
Post incident reviews.
2409
02:15:44,980 –> 02:15:46,300
Revise process.
2410
02:15:46,300 –> 02:15:47,940
Not people.
2411
02:15:47,940 –> 02:15:50,380
Vendors are held to gravity.
2412
02:15:50,380 –> 02:15:51,980
Support for GMSA.
2413
02:15:51,980 –> 02:15:54,620
Signing binding modern authentication.
2414
02:15:54,620 –> 02:15:56,940
Lab echo load chime.
2415
02:15:56,940 –> 02:15:59,700
Policy set SMB signing always.
2416
02:15:59,700 –> 02:16:04,740
DAP channel binding required.
2417
02:16:04,740 –> 02:16:06,740
LAPS rotation complete.
2418
02:16:06,740 –> 02:16:08,740
Bass pulse softens.
2419
02:16:08,740 –> 02:16:10,740
KRBTGT rotation scheduled.
2420
02:16:10,740 –> 02:16:12,740
Pass one in seven days.
2421
02:16:12,740 –> 02:16:14,740
Pass two in nine.
2422
02:16:14,740 –> 02:16:16,740
You cannot make this universe perfect.
2423
02:16:16,740 –> 02:16:18,740
But you can make it loud when it bends.
2424
02:16:18,740 –> 02:16:21,740
You can make privilege ceremonial and drift impatient.
2425
02:16:21,740 –> 02:16:23,740
You can make collapse reversible.






