Defend AD DNS on Public Wi-Fi


At Cisco Stay Melbourne 2025, the SOC noticed many fascinating behaviors from the varied shoppers of the convention community.  One of many extra fascinating ones was observations pertains to the DNS site visitors emitted by Home windows shoppers on the community, in search of their group’s Lively Listing Area Controllers.  With our Endace full packet seize for the occasion, we had been in a position to seize DNS site visitors from shoppers on the community and carry out evaluation utilizing Splunk Enterprise.

As a reminder, when a Home windows consumer is looking for to speak to a site controller it should make DNS queries for SRV data for names like _kerberos._tcp.dc._msdcs.DOMAINNAME or _ldap._tcp.dc._msdcs.DOMAINNAME.  These DNS requests allow the consumer to search out close by Kerberos or LDAP servers for his or her area. 

Within the Cisco Stay Melbourne 2025 SOC, we noticed shoppers ship out DNS queries for roughly 3,800 distinct names beginning with “_ldap” or “_kerberos”.  Whereas most of them returned a failure of some type (NXDOMAIN or SERVFAIL), roughly 300 had a profitable DNS response.  A few of these had been profitable in subsequent makes an attempt to connect with the service (which means the area controllers are accessible in some style from the general public web), and some had been adopted up by cleartext LDAP BINDs, leaking credential data throughout the native community and Web.  (SEE DANIEL’S BLOG POST)

Duane - redacted ldap and kerberos queriesDuane - redacted ldap and kerberos queries

There are a number of issues to contemplate from this.

First, there may be an open-source intelligence (OSINT) side to this.  The operators of any wi-fi community that you just connect with along with your laptop computer acquire telemetry about your group.

Second, a malicious wi-fi community may – relying on how your shoppers are configured – trick the consumer into sharing authentication data with it.  Instruments resembling Responder are designed for this objective.  Correctly configured fashionable Home windows shoppers will use SMB signing, LDAP over TLS, LDAP channel binding, and different types of safety towards a hostile community surroundings.  Are you certain your shoppers are configured in a manner that makes them strong towards a hostile community?

Third, in case your group has Lively Listing area controllers on the general public Web, are you taking the mandatory steps to guard them?

Lastly, the Cisco Stay community is designed to be a secure community for attendees to make use of. However that’s no assure that – elsewhere – the identical SSID couldn’t be used to face up a hostile community.  Shoppers will normally auto-connect once they see a wi-fi community they’ve related to earlier than.

One dependable mitigation for all of this can be a VPN consumer. A correctly configured VPN consumer like Cisco Safe Consumer can assist each a full tunnel VPN and “Begin Earlier than Login”.  With this characteristic, the consumer laptop connects to the VPN as early as potential.  All site visitors, together with DNS lookups, are despatched over the VPN.  Whereas this doesn’t eradicate all these dangers, it raises the security bar considerably.

Try the opposite blogs by my colleagues within the Cisco Stay Melbourne 2026 SOC.


We’d love to listen to what you suppose! Ask a query and keep related with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram
X