Saturday, March 21, 2026
HomeHealthDefend AD DNS on Public Wi-Fi

Defend AD DNS on Public Wi-Fi

At Cisco Reside Melbourne 2025, the SOC noticed many attention-grabbing behaviors from the assorted purchasers of the convention community.  One of many extra attention-grabbing ones was observations pertains to the DNS site visitors emitted by Home windows purchasers on the community, in search of their group’s Energetic Listing Area Controllers.  With our Endace full packet seize for the occasion, we have been capable of seize DNS site visitors from purchasers on the community and carry out evaluation utilizing Splunk Enterprise.

As a reminder, when a Home windows consumer is in search of to speak to a site controller it is going to make DNS queries for SRV information for names like _kerberos._tcp.dc._msdcs.DOMAINNAME or _ldap._tcp.dc._msdcs.DOMAINNAME.  These DNS requests allow the consumer to seek out close by Kerberos or LDAP servers for his or her area.

Within the Cisco Reside Melbourne 2025 SOC, we noticed purchasers ship out DNS queries for roughly 3,800 distinct names beginning with “_ldap” or “_kerberos”.  Whereas most of them returned a failure of some kind (NXDOMAIN or SERVFAIL), roughly 300 had a profitable DNS response.  A few of these have been profitable in subsequent makes an attempt to connect with the service (which means the area controllers are accessible in some style from the general public web), and some have been adopted up by cleartext LDAP BINDs, leaking credential info throughout the native community and Web.  (SEE DANIEL’S BLOG POST)

Duane - redacted ldap and kerberos queriesDuane - redacted ldap and kerberos queries

There are a number of issues to contemplate from this.

First, there’s an open-source intelligence (OSINT) facet to this.  The operators of any wi-fi community that you just hook up with together with your laptop computer achieve telemetry about your group.

Second, a malicious wi-fi community might – relying on how your purchasers are configured – trick the consumer into sharing authentication info with it.  Instruments corresponding to Responder are designed for this objective.  Correctly configured trendy Home windows purchasers will use SMB signing, LDAP over TLS, LDAP channel binding, and different types of safety in opposition to a hostile community atmosphere.  Are you positive your purchasers are configured in a manner that makes them strong in opposition to a hostile community?

Third, in case your group has Energetic Listing area controllers on the general public Web, are you taking the required steps to guard them?

Lastly, the Cisco Reside community is designed to be a protected community for attendees to make use of. However that’s no assure that – elsewhere – the identical SSID couldn’t be used to face up a hostile community.  Shoppers will often auto-connect after they see a wi-fi community they’ve related to earlier than.

One dependable mitigation for all of it is a VPN consumer. A correctly configured VPN consumer like Cisco Safe Consumer can help each a full tunnel VPN and “Begin Earlier than Login”.  With this function, the consumer laptop connects to the VPN as early as potential.  All site visitors, together with DNS lookups, are despatched over the VPN.  Whereas this doesn’t get rid of all these dangers, it raises the protection bar considerably.

Try the opposite blogs by my colleagues within the Cisco Reside Melbourne 2026 SOC.


We’d love to listen to what you suppose! Ask a query and keep related with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram
X


RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments