CyberArk DNA™ Technical FAQ
CyberArk DNA™ Technical FAQ
Technical FAQ
November 2020
CyberArk DNA™ (DNA) is an innovative standalone discovery and audit tool that
automatically scans an organization’s network, typically a complex, manual process, for
the following:
■ Data related to privileged and non-privileged accounts
■ Embedded and Hard-coded application credentials
■ SSH key exposure
■ Potential credential theft risks, including Pass-the-Hash attacks, Pass-the-Ticket
and Overpass-the-Hash
The easy-to-use scanner automatically discovers and analyzes any privileged and non-
privileged account, then generates a report and visual organizational maps that evaluate
the privileged account security status in the organization.
CyberArk DNA™
3 What technology does CyberArk DNA use?
Accounts
CyberArk DNA scans Windows and Unix/Linux/Mac computers. DNA scans each
computer and maps the users who can access it, including local and domain users.
On Windows machines, DNA also scans service accounts used in:
■ Windows Services Accounts
■ Windows Scheduled Tasks
CyberArk DNA™
CyberArk DNA™ Technical FAQ 4
SSH Keys
CyberArk DNA discovers Private and Public SSH Keys, and correlates the keys to the
relevant accounts discovered in the “Account Scan”.
DNA analyzes all possible SSH Key Trusts to show which account on a certain
machine can connect to what account on a remote machine. Using this information,
DNA creates an interactive organizational trust map that displays all possible trusts.
Pass-the-Hash Vulnerability
CyberArk DNA detects stored Privileged account password hashes (representations
of the password itself). DNA analyzes and presents computers vulnerable to
Credential Theft attacks (Pass-the-Hash, Pass-the-Ticket and Overpass-the-Hash),
and creates an interactive organizational vulnerability map that displays all possible
routes of attacks on the network.
Note:
Scanning for the above mentioned attacks increases bandwidth usage.
See below for more details.
CyberArk DNA™
5 What technology does CyberArk DNA use?
CyberArk DNA™
CyberArk DNA™ Technical FAQ 6
Note:
A user who is not a domain Administrator must be a domain user and must
belong to the Administrators group or to a group nested within the
Administrators group.
Note:
You can configure a specific least privilege user using a subdoers file. For more
information, see How do I scan using least privilege permissions?, page 19.
Note:
CyberArk DNA™
7 What type of account is required to perform a scan?
To scan using the Active Directory as a source, your organization must use an
Active Directory bridge solution. For example, Centrify DirectControl.
When scanning Unix/Linux machines with accounts other than root, DNA requires the
use of sudo to run commands. Hence, the administrative user account(s) configured
to scan with DNA must have permissions to run sudo on the scanned Unix/Linux
machines. For more information, see Configuring Root Permissions Using the
Sudoers File in the CyberArk DNA User Guide.
Note:
Currently, DNA supports the following sudo-replacement solutions:
CA Privileged Identity Manager/ControlMinder using the sesudo
command
Centrify Access Manager/DirectAudit using the dzdo command
CyberArk DNA™
CyberArk DNA™ Technical FAQ 8
CyberArk DNA™
9 Will the scan burden my network or affect the performance of my DCs or target
computers?
CyberArk DNA™
CyberArk DNA™ Technical FAQ 10
Note:
The discovery of SSH keys on Windows machines is not read-only. This
discovery feature is disabled by default and must be enabled manually.
CyberArk DNA™
11 Where does CyberArk DNA store the credentials?
Note:
The discovery of SSH keys on Windows machines is not read-only, and SSH
keys need to be securely downloaded from the scanned machine to the
scanning machine. This discovery feature is disabled by default and must be
enabled manually.
CyberArk DNA™
CyberArk DNA™ Technical FAQ 12
CyberArk DNA™
13 What are SPN and why are they risky?
CyberArk DNA™
CyberArk DNA™ Technical FAQ 14
The following CyberArk benchmark shows typical CyberArk DNA performance. The
scan was performed on a Windows 7 computer using 25 threads. The Windows
machines were scanned using separate processes and the Unix/Linux machines were
scanned using one main process.
Windows Scan
For Windows:
CyberArk DNA™
15 What are SPN and why are they risky?
Unix/Linux Scan
For Unix/Linux:
CyberArk DNA™
CyberArk DNA™ Technical FAQ 16
Total number of hard coded credentials discovered during the scan 2,140,000
Note:
Make sure the above protocols are enabled on all of the target computers you
want to scan and that firewalls do not block this type of traffic.
CyberArk DNA™
17 What does DNA use each required port for?
135, 137, 138 These are the NetBIOS ports that should be open on host-based
(typically also firewalls.
139)
389/636 This is the LDAP service (only relevant to domain controllers) and
should be accessible both through networ and host-based firewalls.
CyberArk DNA™
CyberArk DNA™ Technical FAQ 18
DNA on Unix/Linux
Linux: uname, ls, test, cat, lastlog, getent, grep, wc, find, xargs, ssh-keygen, echo,
rm, date, hostname, ifconfig, sh
AIX: uname, ls, test, cat, lsdev, grep, wc, ssh-keygen, echo, rm, istat, hostname,
ifconfig, sh
Solaris: uname, echo, test, cat, getent, grep, psrinfo, wc, find, xargs, ssh-keygen, ls,
rm, truss, hostname, ifconfig, sh
Notes:
Note:
When configuring the sudoers file to enable root access for a non-root account,
include all the commands above.
In order to calculate the Public SSH key fingerprint, DNA has to create a temporary
file. The “rm” command is then used to delete this temporary file.
CyberArk DNA™
19 Which methods of Data Protection does DNA use?
Requires
Command Proposed SUDO Rule
SUDO?
CyberArk DNA™
CyberArk DNA™ Technical FAQ 20
Requires
Command Proposed SUDO Rule
SUDO?
wc No No SUDO required
rm No No SUDO required
Note:
Different *NIX platforms may have different file paths.
CyberArk DNA™
21 Machine/Account Data – Accounts Discovered
Non-Privileged Accounts
Find out the total number of accounts that were discovered by adding up the number
of domain accounts and local accounts.
Find out the number of non-privileged accounts that were discovered by subtracting
the number of privileged accounts from the total number of accounts that were
discovered.
You can do this in the ‘Windows Scan’ sheet.
To view the number of discovered domain accounts:
1. Filter all the domain accounts (Account Type=domain:*).
2. Remove the ‘Domain Users’ group.
3. Remove duplicates according to Account Name and Account Type.
To view the number of discovered local accounts:
1. Filter all the local accounts (Account Type=Local).
2. Remove duplicates according to Computer Name and Account Name.
CyberArk DNA™
CyberArk DNA™ Technical FAQ 22
CyberArk DNA™
23 Machine/Account Data – least privilege risk - Windows business users
5. Summing the number of users from section 2 and 4 will result with the number of
Privileged Business users on servers.
CyberArk DNA™