Attempts of Kerberos Coercion Via DNS SPN Spoofing

Last updated on:

In this page

About the rule

Rule Type

Standard

Rule Description

Detects the Base64 pattern "UWhRC?AAYBAAAA", associated with Kerberos coercion attacks that spoof SPNs using nslookup-based tools.

Severity

Trouble

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

@Swachchhanda Shrawan Poudel (Nextron Systems)