System Center Orchestrator Security
** **
Introduction: System Center Orchestrator / Opalis is an automation tool which has the ability to orchestrate different Microsoft Technologies such as System Center Suite, Microsoft Exchange, Microsoft Active Directory et. Orchestrator provides End-End solutions for Operating System Deployment, Application streaming, VDI, FIM by integrating infrastructure components with Programming logic. Orchestrator is a proven tool for Enterprise Computing, End-user computing and managing Data Center activities.
How is the Security managed with Orchestrator? - This is the common question which most of the Stake Holders has in their mind and this post will try to clear most of the security related questions.
**Scenario: **
Contoso Corp has offices across the globe and they want to perform Application deployment across their offices. Contoso relied on Microsoft System Center Orchestrator to efficiently perform the Application deployment and has the centralized console to view the status of the task being executed.
Without the System Center Orchestrator, the deployment would still happen but, Administrators have to manually keep track of the jobs and will not be able to execute End-End solution with single task which Orchestrator performs seamlessly.
Below chart provides a typical implementation of System Center Orchestrator in an Organization.
Note: The below chart should not be compared as Scaling metric.
Role |
Operating System |
Instance |
Memory |
Hypervisor |
Windows Server 2008 R2 |
Physical |
128 GB |
Primary Domain Controller |
Windows Server 2008 R2 |
Virtual |
4 GB |
Additional Domain Controller |
Windows Server 2008 R2 |
Virtual |
4 GB |
Microsoft SQL Server 2008 R2 |
Windows Server 2008 R2 |
Virtual |
6 GB |
Microsoft SQL Server 2008 R2 - 2 |
Windows Server 2008 R2 |
Virtual |
6 GB |
Microsoft System Center Orchestrator Runbook Server |
Windows Server 2008 R2 |
Virtual |
6 GB |
Microsoft System Center Orchestrator Runbook Server -2 |
Windows Server 2008 R2 |
Virtual |
6 GB |
Microsoft System Center Orchestrator Management Server |
Windows Server 2008 R2 |
Virtual |
6 GB |
Microsoft System Center Configuration Manager 2012 |
Windows Server 2008 R2 |
Virtual |
8 GB |
Below diagram shows the basic implementation of the System Center Orchestrator with 2 different sites separated by Cisco Routers. Below architecture is subject for testing and not strictly implemented in production and Network administrators should tie the server components in their existing infrastructure.
Figure : Orchestrator Implementation
After performing Infrastructure readiness and collect the necessary information to perform the Operating system activities, Microsoft SQL Server, System Center Orchestrator Server ( SCORCH ) , System Center Configuration Manager server should be implemented in the existing Active directory domain. The installation of the Servers can be performed by the Server Operations Team liaising with Network Operations Center team and all the servers should be patched to latest windows updates, Service packs and any existing issues in the current environment should be resolved / managed accordingly.
Note: Most of the Servers defined above are implemented in the virtual infrastructure, Virtual Infrastructure team should advice on the memory allocation to the servers and manage the VLANs accordingly.
* *
From a Project Management perspective, detailed Feasibility study should be performed to understand the business needs, requirements and develop high level estimation of the project also providing the project proposal and review processes. Project Management team should define the scope of work , finalize the project schedule, resourcing , define project processes and obtain the signoff from the Client.
Once the Project management gets the go-ahead from Client, the Server Operation team will start building the servers which involves building and configuring the Server and applications respectively.
Role Delegation: Administrators can design the Delegation model which provides desired access to users and allows them to perform specific task. The role delegation can be performed at different levels such as
- Microsoft Active Directory delegation
- SQL Server role delegation
- SCORCH delegation model
- SCCM delegation model
Each delegation model uses Microsoft Identity and Access management to access the resources and perform the required task.
One of the key Authentication protocol used my Microsoft is Kerberos which provides strong encryption for the data that travels on the wire. Kerberos is proven secured authentication protocol used by Microsoft for its various applications / server applications. Microsoft System Center Orchestrator heavily relies on the Kerberos protocol to securely transmit the data on the wire. Microsoft SQL Server forms the key communication component for successful implementation and execution of SCORCH. The SCORCH Runbooks communicates with Microsoft SQL Server for all the activities / jobs. Runbooks constantly access Microsoft SQL Server for activities and store the activity related information into the SQL database.
With the above design , many stake holders has the question of security. How is the data transmitted on the wire ?, how is the data retrieved ?, what are the security protocols being used ? . Microsoft uses Kerberos as authentication protocol to execute the RunBook activities from Microsoft SQL Server database. When executing the Runbook, Runbook Designer provides an option to specify the credentials to be used to run the activity. As mentioned earlier, all the Runbook activity data including the credentials defined are stored in Database and any credentials defined in Runbook are stored in encrypted format.
Orchestrator Runbook can be divided into
- Secured Attribute field
- Non Secure Attribute fields
Secured attribute fields which captures the User information followed by credentials are stored as encrypted values in the Microsoft SQL Database. Non Secured attributes takes different values which can be exposed and doesn’t cause security concerns when viewed over the wire or through expert logging on the servers.
When Runbook designer executes Runbooks, an average of 104-119 Dll’s gets loaded and this depends on the activities that gets referenced and loads the DLL on demand. Runbook loads the following security DLLs for any runbook instance.
- ACLUI.dll – This is an Security Descriptor Editor, which stores the transporting information of a Security descriptor. Runbook designer invokes this Dll for security descriptor / DACLs being referenced
- Crypt32.dll – Runbook designer use this Dll to perform encryption/ decryption of user sensitive data.
- CryptBase.dll – This DLL works in conjunction with Cyrpt32.dll and performs data encryption
- CryptSP.dll
- Encyptionobjects.Strings.dll – This DLL performs the encryption for the strings referenced in the Runbook activities. ( eg: User, email , files, folders .. )
- orchestratorSecurity.strings.dll
** **
To understand the process and thread level activity , remote debugging techniques can be used to examine the live data / stack information. Either Windbg.exe or ADPlus.exe can be used to examine the application stack ( All the relevant pdb files should be downloaded to validate the stack information )
To understand the Network level activity, detailed analysis is made using the Wireshark / Netmon utility to examine the encryption mechanism invoked in the Runbook. Below examples are conduced to check the Kerberos invocation by the Orchestrator Runbook while establishing communication with Database and validate the credentials explicitly mentioned under the Runbook respectively.
** **
Source IP : 192.168.39.5
Destination IP : 192.168.39.2
** **
330 389.045917 192.168.39.5 192.168.39.2 TCP 49328 > ms-sql-s [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=8
TCP communication started between Orchestrator server and SQL Server
331 389.046341 192.168.39.2 192.168.39.5 TCP ms-sql-s > 49328 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 WS=8
The TCP 3 way handshake process
332 389.046386 192.168.39.5 192.168.39.2 TCP 49328 > ms-sql-s [ACK] Seq=1 Ack=1 Win=65536 Len=0
333 389.046500 192.168.39.5 192.168.39.2 TDS TDS7/8 0x12 Packet
SQL Server communication ( TDS = Tabular data stream protocol ) initiated. Below is the blob, the orchestrator service requests for the database connection initiation
06 00 00 c0 a8 27 05 c0 a8 .\F.@... ....'...
0020 27 02 c0 b0 05 99 92 de 87 8b 69 bc c7 fc 50 18 '....... ..i...P.
0030 01 00 cf a6 00 00 12 01 00 34 00 00 00 00 00 00 ........ .4......
0040 15 00 06 01 00 1b 00 01 02 00 1c 00 0c 03 00 28 ........ .......(
0050 00 04 ff 08 00 01 55 00 00 00 4d 53 53 51 4c 53 ......U. ..MSSQLS
0060 65 72 76 65 72 00 c0 09 00 00 erver... ..
334 389.047203 192.168.39.2 192.168.39.5 TDS Response Packet
Response packet from the SQL Server and the blob included below
0000 00 0c 29 c4 ef 51 00 0c 29 1d 5a cc 08 00 45 00 ..)..Q.. ).Z...E.
0010 00 4d 4d da 40 00 80 06 dd 78 c0 a8 27 02 c0 a8 .MM.@... .x..'...
0020 27 05 05 99 c0 b0 69 bc c7 fc 92 de 87 bf 50 18 '.....i. ......P.
0030 01 00 1c 3a 00 00 04 01 00 25 00 00 01 00 00 00 ...:.... .%......
0040 15 00 06 01 00 1b 00 01 02 00 1c 00 01 03 00 1d ........ ........
0050 00 00 ff 0a 32 06 40 00 00 00 00 ....2.@. ...
335 389.048846 192.168.39.5 192.168.39.2 TDS TDS7/8 0x12 Packet
Orchestrator server is querying for the database, and the blob is listed below
0000 00 0c 29 1d 5a cc 00 0c 29 c4 ef 51 08 00 45 00 ..).Z... )..Q..E.
0010 00 8f 46 fb 40 00 80 06 00 00 c0 a8 27 05 c0 a8 ..F.@... ....'...
0020 27 02 c0 b0 05 99 92 de 87 bf 69 bc c8 21 50 18 '....... ..i..!P.
0030 01 00 cf d9 00 00 12 01 00 67 00 00 00 00 16 03 ........ .g......
0040 01 00 5a 01 00 00 56 03 01 50 a2 d7 d3 17 b1 0a ..Z...V. .P......
0050 11 bb a0 c3 5a 79 ce d6 fe 19 85 7e 07 4e a5 da ....Zy.. ...~.N..
0060 29 1b 24 85 02 e9 25 b1 a8 00 00 18 00 2f 00 35 ).$...%. ...../.5
0070 00 05 00 0a c0 13 c0 14 c0 09 c0 0a 00 32 00 38 ........ .....2.8
0080 00 13 00 04 01 00 00 15 ff 01 00 01 00 00 0a 00 ........ ........
0090 06 00 04 00 17 00 18 00 0b 00 02 01 00 ........ .....
336 389.049466 192.168.39.2 192.168.39.5 TDS TDS7/8 0x12 Packet
Below is the display of the buffer information, the blob indicates that communication is using SSL communication
0000 00 0c 29 c4 ef 51 00 0c 29 1d 5a cc 08 00 45 00 ..)..Q.. ).Z...E.
0010 02 91 4d db 40 00 80 06 db 33 c0 a8 27 02 c0 a8 ..M.@... .3..'...
0020 27 05 05 99 c0 b0 69 bc c8 21 92 de 88 26 50 18 '.....i. .!...&P.
0030 01 00 7f ed 00 00 12 01 02 69 00 00 00 00 16 03 ........ .i......
0040 01 02 5c 02 00 00 4d 03 01 50 a2 d7 d3 ad d7 fc ..\..M. .P......
0050 85 db 2f 03 16 f3 61 64 35 8e b7 76 e2 c8 18 08 ../...ad 5..v....
0060 a4 46 2f 2c c3 c8 6a f0 9d 20 a1 14 00 00 f1 b9 .F/,..j. . ......
0070 41 06 9c 26 8b 0d 96 4b 17 b8 7f 0d 2c f1 db d3 A..&...K ....,...
0080 af 18 30 91 dc 6c 21 73 9b 80 00 2f 00 00 05 ff ..0..l!s .../....
0090 01 00 01 00 0b 00 02 03 00 02 00 00 01 fd 30 82 ........ ......0.
00a0 01 f9 30 82 01 62 a0 03 02 01 02 02 10 61 81 d6 ..0..b.. .....a..
00b0 23 35 0b 00 a5 45 e4 0d d2 2b f6 48 94 30 0d 06 #5...E.. .+.H.0.
00c0 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 3b 31 39 .*.H.... ....0;19
00d0 30 37 06 03 55 04 03 1e 30 00 53 00 53 00 4c 00 07..U... 0.S.S.L.
00e0 5f 00 53 00 65 00 6c 00 66 00 5f 00 53 00 69 00 _.S.e.l. f._.S.i.
00f0 67 00 6e 00 65 00 64 00 5f 00 46 00 61 00 6c 00 g.n.e.d. _.F.a.l.
0100 6c 00 62 00 61 00 63 00 6b 30 1e 17 0d 31 32 31 l.b.a.c. k0...121
0110 31 31 33 32 32 34 35 33 36 5a 17 0d 34 32 31 31 11322453 6Z..4211
0120 31 33 32 32 34 35 33 36 5a 30 3b 31 39 30 37 06 13224536 Z0;1907.
0130 03 55 04 03 1e 30 00 53 00 53 00 4c 00 5f 00 53 .U...0.S .S.L._.S
0140 00 65 00 6c 00 66 00 5f 00 53 00 69 00 67 00 6e .e.l.f._ .S.i.g.n
0150 00 65 00 64 00 5f 00 46 00 61 00 6c 00 6c 00 62 .e.d._.F .a.l.l.b
0160 00 61 00 63 00 6b 30 81 9f 30 0d 06 09 2a 86 48 .a.c.k0. .0...*.H
337 389.050086 192.168.39.5 192.168.39.2 TDS TDS7/8 0x12 Packet
338 389.051762 192.168.39.2 192.168.39.5 TDS TDS7/8 0x12 Packet
354 389.261014 192.168.39.5 192.168.39.2 TCP 49328 > ms-sql-s [ACK] Seq=362 Ack=722 Win=64768 Len=0
360 389.295661 192.168.39.2 192.168.39.5 TCP ms-sql-s > 49328 [ACK] Seq=722 Ack=3282 Win=65536 Len=0
362 389.296860 192.168.39.2 192.168.39.5 TDS Response Packet
363 389.307362 192.168.39.5 192.168.39.2 TCP 49328 > ms-sql-s [FIN, ACK] Seq=3775 Ack=1151 Win=64512 Len=0
Orchestrator server sending FIN ACK to close the connection** **
365 389.307833 192.168.39.2 192.168.39.5 TCP ms-sql-s > 49328 [FIN, ACK] Seq=1151 Ack=3776 Win=65024 Len=0
The sql server responds with FIN,ACK and closes the connection
For the connections that requires Kerberos authentication, Orchestrator Server initiates the communication as shown below
673 390.435280 192.168.39.5 192.168.39.2 TCP 49349 > kerberos [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=8
674 390.435788 192.168.39.2 192.168.39.5 TCP kerberos > 49349 [SYN, ACK] Seq=0 Ack=1 Win=8192 Len=0 MSS=1460 WS=8
675 390.435811 192.168.39.5 192.168.39.2 TCP 49349 > kerberos [ACK] Seq=1 Ack=1 Win=65536 Len=0
676 390.435868 192.168.39.5 192.168.39.2 KRB5 TGS-REQ
677 390.436309 192.168.39.2 192.168.39.5 TCP kerberos > 49349 [ACK] Seq=1 Ack=1612 Win=65536 Len=0
679 390.437372 192.168.39.2 192.168.39.5 KRB5 TGS-REP
The summary of the blob for the above packets is shown below
A6.L..-P~}V.Je..\.L..r;._..h5..H91.:.._..N..r.....c.%$....lO.Z]...fw.d5..,.....i...l7j.Z.>Y>...z........7.....y&.wK..G\..}...^]...A.f. 6.....h<O..v......^....AGDj....xU..b........a....`Q. Z*...s ..=.,..
..*`w/1....sw.......r..".V.......Ow.......A.h.jO../........9......
.`d.7.o;i....b..%.#!.:..~gF.....$.TJI. ~.a.......b...3;.o. .X}...w..{]......`:...?W..SK.V.........n.-....^.U...j/Q.J<...W.C ..d.....vh....yLa.'0C./.....~..OCN."...U..%_.@p.........L.Sy....=!g...
.........e.+r.......v.....UJ....W....v.....W~.......]..X.q,n.cHQ.p.V.....2f.$.,...|.u......2.ehS.Ir).3^..v..@......e.n@..[Z..M....\...e.?..I..z.b<....FG.....*.Q....L5....k..#z... J..51wm.....Z.GQ...c=^qX...{...o..`'....+..G.*DT.....k4..(..SFs^M.=.).R..y...u.U.D_."...=L...Y..6.bI..{f......./s..|.5.&m.. ;.h.3........f..S.^P..&...#c_...Y.3K.s.l.[..W..*.,,..C..l.TA.Xl..{........L..1".{pTg..BD...yI...8.E.k.8Vz..*..}..[=........b......#.........t*.......U.
...6.j...a..ng....X...Z..s.n.......0..............$Ay|:.g.n.....0.6..r!T.s..CJy..F%"fDg.....lG..m`.B..,.$#...n....%.....}.
.Mx..i..U.N...0../.%...D..!..0....Su.@#!y.f..*._.b........!oz|......0........@......CONTOSO.COM.705.......0,..MSSQLSvc. win-prhvj5grj7a.contoso.com:1433....20370913024805Z....6.....0................y...0................X..<.........pd.@.!.G....+...x....J5...B.....ht.^u'8..>...7m.....5.2.}....6.....}.m.OG[(....n...h3.=........_p.
..h.V..=.........;8....m...0...............CONTOSO.COM..0.......0...actionsrv....a...0..
........CONTOSO.COM.705.......0,..MSSQLSvc. win-prhvj5grj7a.contoso.com:1433....0......................!.+...^5.o.\UL9....V...k...../.%.F..|Q.U"..*..m....P......Y.}...G...:...,#.... Q.....'T3.([.K.3.C....7.X..Ye.....#I5m.B
}..S..*.#...L.%...B.............7a.eW....../...F..{...:.........4."Z........)..UT...gi....L.,........qW...;..R..<.....}..kp S...`.........L)..E.5....Z.._.X.'q..)...R9o.,../,..V....!.....{.q2....,.V.;:A..X.Q......u6_(W:D-..:..~...g2.N..n8"...\..?..)Prl.....EAwg'1!......wRA....4 ....].....w#.*^+.6..z.3PsO.."...O.?..s'49.]t[.:}j4. ._`..=&v..x..W{D1.ws.[o..W.m)..:...................Yun<....#W.2a..+..~..J...~;<z.Z.tf+..*d2.....].y (...8...]56.SVf..ld
..Xszj9%.Z.....5b........_....)+......:....{.........d..;k/...,.....2.....j@....#....Ku..
7qL)..<q.XD.V..=-a..=...v_a...f..q....... ........|o...Zl<........4.....-...c......N.........q.7...~..`..g}......%...XA..E.x...5...n,.+.....k....~.z..fN.xd.n...&..np....7:.x.A.d..........$.#......2....*..w.s....[7zxUiap...3 ....|MZC...0ku.4..P.W..........%d..p.w/,...y.!.qhav..j.H.f<b.............`1i....I6A....:.....e.....F.w/8.8...>7..N.;.....;.,$......wZ.....Y.0}..8L.....e...J...ea..f.Z.h-{D..pa....X`".$.NL......_...o.=.;.
....EA...he.e....U.@...s...H..fp..0Qvi..1...........6...O....}.'....>
6u.u3..!Ww......)....90..5........,...(..A..-w?.pv.I:<..3...... .a..2... ..i...T....P7.Ny.Yam...l...........1.y.....\.........Zy.2..S;..8......p......[.x+.....`!..L....#....`.X....}...a...g......t......
....x.....U....%......A'431J.YU.M.d5.X..*.}j..bRi!.f8..b......j+...g..3........HS.....3.s..E.o8~.!.../..9).`....u.].:!....;....yU
Summary : From the above blog we can view the server name and the SQL Server connection strings but the password information is encrypted .
RunBook Security
** **
TCP Stream
** **
1. Start Of Runbook Designer
When we start the Runbook Designer, it queries database to connect to Runbook Server. Below is the TCPIP stream activity captured on the network. We could see the following
- DBO Version
- Select statement
Encryption :
- Server names
- Credentials
...:....s.e.l.e.c.t. .1. .f.r.o.m. .d.b.o...V.E.R.S.I.O.N......5....... .8...............................&...........2..S.E.L.E.C.T. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.U.n.i.q.u.e.I.D.]. .A.S. .U.n.i.q.u.e.I.D.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.C.o.m.p.u.t.e.r.]. .A.S. .C.o.m.p.u.t.e.r. . .F.R.O.M. .A.C.T.I.O.N.S.E.R.V.E.R.S. .W.H.E.R.E. .(.(.A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.]. .I.S. .N.O.T. .N.U.L.L.). .A.N.D. .(.D.A.T.E.D.I.F.F.(.s.s.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.].,. .g.e.t.U.T.C.D.a.t.e.(.).). .>. .4.5.).)...&........&........&.......5.........$..U.n.i.q.u.e.I.D............4.C.o.m.p.u.t.e.r.....8.R.O.W.S.T.A.T......A.C.T.I.O.N.S.E.R.V.E.R.S......................y............&.....
........&..............&..............&..................2............&.....
..&.. .....&........&.........".5..............y.............................&.....
.....5..y................:....s.e.l.e.c.t. .1. .f.r.o.m. .d.b.o...V.E.R.S.I.O.N......5....... .8...............................&...........2..S.E.L.E.C.T. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.U.n.i.q.u.e.I.D.]. .A.S. .U.n.i.q.u.e.I.D.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.C.o.m.p.u.t.e.r.]. .A.S. .C.o.m.p.u.t.e.r. . .F.R.O.M. .A.C.T.I.O.N.S.E.R.V.E.R.S. .W.H.E.R.E. .(.(.A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.]. .I.S. .N.O.T. .N.U.L.L.). .A.N.D. .(.D.A.T.E.D.I.F.F.(.s.s.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.].,. .g.e.t.U.T.C.D.a.t.e.(.).). .>. .4.5.).)...&........&........&.......5.........$..U.n.i.q.u.e.I.D............4.C.o.m.p.u.t.e.r.....8.R.O.W.S.T.A.T......A.C.T.I.O.N.S.E.R.V.E.R.S......................y............&.....
........&..............&..............&..................2............&.....
..&.. .....&........&.........".5..............y.............................&.....
.....5..y................:....s.e.l.e.c.t. .1. .f.r.o.m. .d.b.o...V.E.R.S.I.O.N......5....... .8...............................&...........2..S.E.L.E.C.T. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.U.n.i.q.u.e.I.D.]. .A.S. .U.n.i.q.u.e.I.D.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.C.o.m.p.u.t.e.r.]. .A.S. .C.o.m.p.u.t.e.r. . .F.R.O.M. .A.C.T.I.O.N.S.E.R.V.E.R.S. .W.H.E.R.E. .(.(.A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.]. .I.S. .N.O.T. .N.U.L.L.). .A.N.D. .(.D.A.T.E.D.I.F.F.(.s.s.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.].,. .g.e.t.U.T.C.D.a.t.e.(.).). .>. .4.5.).)...&........&........&.......5.........$..U.n.i.q.u.e.I.D............4.C.o.m.p.u.t.e.r.....8.R.O.W.S.T.A.T......A.C.T.I.O.N.S.E.R.V.E.R.S......................y............&.....
........&..............&..............&..................2............&.....
..&.. .....&........&.........".5..............y.............................&.....
.....5..y................:....s.e.l.e.c.t. .1. .f.r.o.m. .d.b.o...V.E.R.S.I.O.N......5....... .8...............................&...........2..S.E.L.E.C.T. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.U.n.i.q.u.e.I.D.]. .A.S. .U.n.i.q.u.e.I.D.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.C.o.m.p.u.t.e.r.]. .A.S. .C.o.m.p.u.t.e.r. . .F.R.O.M. .A.C.T.I.O.N.S.E.R.V.E.R.S. .W.H.E.R.E. .(.(.A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.]. .I.S. .N.O.T. .N.U.L.L.). .A.N.D. .(.D.A.T.E.D.I.F.F.(.s.s.,. .A.C.T.I.O.N.S.E.R.V.E.R.S...[.H.e.a.r.t.b.e.a.t.].,. .g.e.t.U.T.C.D.a.t.e.(.).). .>. .4.5.).)...&........&........&.......5.........$..U.n.i.q.u.e.I.D............4.C.o.m.p.u.t.e.r.....8.R.O.W.S.T.A.T......A.C.T.I.O.N.S.E.R.V.E.R.S......................y............&.....
........&..............&..............&..................2............&....
..&.. .....&........&.........".5..............y.............................&.....
.....5..y.............
2. Password Encryption
Below is the precise information about the encryption being captured. From the below blob we can see the runbook parameters being passed such as
- Unique ID
- Wait for completion
- Wait time
- Computer name
- Program mode
- User name
The highlighted portion below shows the clear encryption being performed
$..U.n.i.q.u.e.I.D............4.P.r.o.g.r.a.m.....8E.x.e.c.u.t.i.o.n.M.o.d.e............4
S.t.a.r.t.u.p.D.i.r............4
P.a.r.a.m.e.t.e.r.s.....2.W.a.i.t.F.o.r.C.o.m.p.l.e.t.i.o.n.....&..W.a.i.t.T.i.m.e............4.C.o.m.p.u.t.e.r.N.a.m.e.....&..P.r.o.g.r.a.m.M.o.d.e............4.U.s.e.r.n.a.m.e............4.P.a.s.s.w.o.r.d....|..a.WI..@.M.<.B.c.s.c.r.i.p.t. .c.:.\s.c.r.i.p.t.s.\l.i.s.t.d.r.i.v.e.s...v.b.s.................l.o.c.a.l.h.o.s.t......2.c.o.n.t.o.s.o...c.o.m.\a.d.m.i.n.i.s.t.r.a.t.o.r.L.\`.d...T...~.E.c./.\`.d...T...~.D.e./.0.0.8.5.6.1.2.5.8.A.1.E.7.7.4.E.A.7.2.5.0.8.1.A.4.F.0.F.2.F.0.D.0.1.0.0.0.0.0.0.F.6.E.5.1.7.6.1.2.1.1.5.B.D.F.A.A.3.E.D.A.9.3.F.0.D.9.7.8.E.8.7.E.1.7.C.6.2.C.7.7.8.9.B.0.6.E.8.8.F.9.6.9.8.E.C.E.3.2.3.E.B.8.9.A.6.0.3.8.4.A.6.7.3.3.7.0.5.4.2.E.5.7.F.3.E.E.F.5.9.B.F.2.5.4.A.\`.d...T...~.D.e./..........y.............
Conclusion: The blog emphasizes on the security aspects of the Orchestrator and the Runbook credentials , focus on major security protocols and the DLL’s being referenced. The examples shows the information handling on the wire.
* *
* *