Request A Single Ticket via PowerShell

Last updated on:

Rule name

Rule type

Log sources

MITRE ATT&CK tags

Severity

Request A Single Ticket via PowerShell

Standard

Windows

Credential Access: Steal or Forge Kerberos Tickets - Kerberoasting (T1558.003)

Critical

About the rule

Rule Type

Standard

Rule Description

This detection identifies the use of native PowerShell modules that leverage the System.IdentityModel.Tokens.KerberosRequestorSecurityToken class to extract Service Principal Names (SPNs) for a single computer. This technique is commonly used during Kerberos-based attacks such as Kerberoasting or silver ticket attacks, where attackers attempt to request and crack service tickets offline to impersonate services and escalate privileges within the domain.

Severity

Trouble

Rule journey

Attack chain scenario

Exposed remote desktop services → Credential theft → Attacker SPNs query using PowerShell → TGS tickets harvested and cracked offline → Lateral movement

Impact

  • Exposure of service account
  • Impersonation of domain services
  • Domain compromise

Rule Requirement

Prerequisites

Logon to Group Policy Management Console with administrative privileges and enable Module Logging for Windows PowerShell in the Group Policy Management Editor. Ensure to enter * in the Module Names window to record all modules. Similarly enable PowerShell Script Block Logging for Windows PowerShell. Finally, create a new registry key "Microsoft-Windows-Powershell/Operational" in the directory "Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\".

Criteria

Action1: actionname = "PowerShell Script Block Logged" AND SCRIPTEXECUTED contains "System.IdentityModel.Tokens.KerberosRequestorSecurityToken" select Action1.HOSTNAME,Action1.MESSAGE,Action1.SCRIPTEXECUTED

Detection

Execution Mode

realtime

Log Sources

Active Directory

MITRE ATT&CK

Credential Access: Steal or Forge Kerberos Tickets - Kerberoasting (T1558.003)

Security standard:

Enabling this rule will help you meet the security standard's requirement listed below:

DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events.

When this rule is triggered, you're notified of presence of System.IdentityModel.Tokens.KerberosRequestorSecurityToken in PowerShell script execution. This enables you to monitor runtime environments like PowerShell, identify potential credential compromises, and detect attempts to create AD snapshots.

Author

frack113

Future actions

Known False Positives

This rule might be triggered during internal IT operations or diagnostic scripts may legitimately invoke this token class.

Next Steps

When this rule is triggered, the following measures can be implemented:

  1. Identification: Identify if the flagged event is a new incident or part of an existing incident.
  2. Analysis: Analyze the impact and extent of the incident to comprehend the severity of the attack using the Incident Workbench.
  3. Response: Respond promptly by initiating an automated workflow to interrupt the network connections and cease the malicious process.
  4. Monitor TGS Activity: Enforce strong password policies and detect high TGS request rates

Mitigation

Mitigation ID

Mitigation Name

Mitigation description

M1041

Encrypt Sensitive Information

Ensure that Domain Controller backups are properly secured and encrypted.

M1027

Password Policies

Enforce complex and unique passwords for local administrator accounts across all systems in your network.

M1026

Privileged Account Management

Windows: Avoid placing user or admin domain accounts into local administrator groups across systems unless tightly controlled, as this can be equivalent to having a local admin account with the same password everywhere. Follow best practices for designing and administering an enterprise network to limit privileged account use across administrative tiers. Linux: Scraping passwords from memory typically requires root privileges. Adhere to best practices for restricting access to privileged accounts to prevent malicious programs from accessing sensitive memory regions.