
Summary
The detection rule titled 'Potential ADIDNS Poisoning via Wildcard Record Creation' focuses on monitoring Active Directory Integrated DNS (ADIDNS) for unauthorized wildcard record creations that may be exploited by attackers. ADIDNS leverages the access control features of Active Directory Domain Services (AD DS) for DNS management, storing DNS zones as AD objects; however, this robust feature poses security risks, particularly because of default permissions that allow any authenticated user to create DNS records. Attackers can exploit this by creating wildcard records, which redirect traffic that doesn’t explicitly match existing records, leading to Man-in-the-Middle (MitM) attacks. The rule is facilitated by monitoring event code 5137, indicating directory service object modifications, particularly those affecting DNS zones. The setup process of the rule requires enabling detailed auditing through advanced policies to ensure all modifications are logged. The rule's effectiveness is tied to the proactive investigation of associated events and patterns that indicate malicious activity.
Categories
- Windows
- Infrastructure
- Identity Management
Data Sources
- Active Directory
- Windows Registry
- Logon Session
- Application Log
- Network Traffic
ATT&CK Techniques
- T1557
Created: 2024-03-26