Attempts of Kerberos Coercion Via DNS SPN Spoofing
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects the Base64 pattern "UWhRC?AAYBAAAA", associated with Kerberos coercion attacks that spoof SPNs using nslookup-based tools.
Severity
Trouble
Detection
Execution Mode
realtime
Log Sources
Active Directory
Author
@Swachchhanda Shrawan Poudel (Nextron Systems)


