It identifies, detects and investigates advanced threats, compromised identities, and malicious insider actions directed at your organization
MDI sensors are installed on DCs and Federation servers. Analysis and alerting is done in the Azure cloud.
MDI can be used for detecting
Bypass
The key is to avoid talking to the DC as long as possible and make the traffic that we generate appear benign.
To bypass DCSync detection, target users which are whitelisted.
If we have NTLM hash of a DC, we can extract NTLM hashes of any machine account using netsync.
If we forge a Golden ticket with SID History of the Domain Controllers group and Enterprise Domain Controllers Group, there are less chances of detection by MDI
BetterSafetyKatz.exe "kerberos::golden /user:domain-controller-machine-account /id:1000 /sid:S-1-XXXXX /sids:S-1-XXXXX,S-1-XXX /krbtgt:<ntlm_hash> /ptt" "exit"