Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Join Tim Segato, Director, Product Management and Ryan Westman, Manager,…
Join us for a live security brefing with (ISC)2 members.
Ask questions and hear from Cybersecurity experts from eSentire,…
PetitPotam is a variant of the NTLM Relay attack discovered by security researcher Gilles Lionel. It is tracked as an authentication bypass vulnerability in Active Directory (Certificate Services); Microsoft tracks this vulnerability as CVE-2021-36942. Proof of Concept (PoC) code released last week  relies on the Encrypting File System Remote (EFSRPC) protocol to provoke a Windows host into performing an NTLM authentication request against an attacker-controlled server, exposing NTLM authentication details or authentication certificates. This information can be used by an attacker to elevate their privileges in a domain environment. Exploitation would require previous access to a vulnerable device.
In response to the release of PetitPotam PoC code, eSentire has deployed new detection content via eSentire's Managed Log service. Microsoft has released mitigations for the attack. Security patches were released on August 10th, 2021. In the wild attacks abusing PetitPotam have not been observed at this time.
After performing a business impact review, apply the relevant security patches provided by Microsoft for CVE-2021-36942.
In cases where patching is not possible, Microsoft has released alternative mitigations for this attack .
Detailed mitigation steps are available in the Microsoft Knowledge Base article .
PetitPotam is a form of NTLM Relay attack which abuses the EFSRPC protocol. In an attack scenario, an attacker with local network access would abuse this protocol to coerce an NTLM authentication request to a server under an attacker’s control. Researchers have successfully relayed NTLM requests, retrieved using PetitPotam to Active Directory Certificate Services (AD CS) servers, to sign a certificate using the relayed NTLM credentials. An attacker can then leverage this signed certificate to elevate their access and compromise the domain. This attack method is described in detail by SANS .
Known attack methods abusing PetitPotam require the following conditions to be met: