Skip to content

[New Rule] Suspicious Kerberos Ticket request #5430

@adrianchen-es

Description

@adrianchen-es

Description

Elastic should have a rule to detect successful Kerberos service ticket (TGS) requests (event ID 4769) where the ticket encryption type is RC4-HMAC (0x17). RC4-encrypted TGS tickets are commonly targeted in Kerberoasting attacks for offline password cracking of service accounts. Machine account requests are excluded to reduce noise.

Target Ruleset

windows

Target Rule Type

Event Correlation (EQL)

Tested ECS Version

No response

Query

any where event.category: "authentication" and event.code: "4769" and winlog.event_data.Status: "0x0" and winlog.event_data.TicketEncryptionType: "0x17" and not winlog.event_data.ServiceName regex~ ".*\\$"

New fields required in ECS/data sources for this rule?

No response

Related issues or PRs

No response

References

No response

Redacted Example Data

No response

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions