Analytics Story: Active Directory Kerberos Attacks
Description
Monitor for activities and techniques associated with Kerberos based attacks within with Active Directory environments.
Why it matters
Kerberos, initially named after Cerberus, the three-headed dog in Greek mythology, is a network authentication protocol that allows computers and users to prove their identity through a trusted third-party. This trusted third-party issues Kerberos tickets using symmetric encryption to allow users access to services and network resources based on their privilege level. Kerberos is the default authentication protocol used on Windows Active Directory networks since the introduction of Windows Server 2003. With Kerberos being the backbone of Windows authentication, it is commonly abused by adversaries across the different phases of a breach including initial access, privilege escalation, defense evasion, credential access, lateral movement, etc. This Analytic Story groups detection use cases in which the Kerberos protocol is abused. Defenders can leverage these analytics to detect and hunt for adversaries engaging in Kerberos based attacks.
Detections
Data Sources
Name | Platform | Sourcetype | Source |
---|---|---|---|
CrowdStrike ProcessRollup2 | N/A | crowdstrike:events:sensor |
crowdstrike |
Powershell Script Block Logging 4104 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational |
Sysmon EventID 1 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
Sysmon EventID 10 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
Sysmon EventID 3 | Windows | xmlwineventlog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
Windows Event Log Security 4624 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4627 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4688 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4738 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4741 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4768 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4769 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4771 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
Windows Event Log Security 4781 | Windows | xmlwineventlog |
XmlWinEventLog:Security |
References
- https://en.wikipedia.org/wiki/Kerberos_(protocol)
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/2a32282e-dd48-4ad9-a542-609804b02cc9
- https://m0chan.github.io/2019/07/31/How-To-Attack-Kerberos-101.html
- https://stealthbits.com/blog/cracking-active-directory-passwords-with-as-rep-roasting/
- https://attack.mitre.org/techniques/T1558/003/
- https://attack.mitre.org/techniques/T1550/003/
- https://attack.mitre.org/techniques/T1558/004/
Source: GitHub | Version: 1