Kerberoasting Activity - Initial Query

Last updated on:

About the rule

Rule Type

Standard

Rule Description

This rule will collect the data needed to start looking into possible kerberoasting activity. Further analysis or computation within the query is needed focusing on requests from one specific host/IP towards multiple service names within a time period of 5 seconds. You can then set a threshold for the number of requests and time between the requests to turn this into an alert.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Kerberos Activity" AND (ERRORCODE = "0x0" AND ENCRYPTIONTYPE = "0x17") AND (SERVICENAME notendswith "krbtgt,$" OR USERNAME notcontains "$@") select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.SERVICENAME,Action1.REMOTEHOST,Action1.ERRORCODE

Detection

Execution Mode

realtime

Log Sources

Active Directory

Author

@kostastsale