-
Notifications
You must be signed in to change notification settings - Fork 613
Open
Labels
Description
Description
Elastic should have a rule to detect successful Kerberos service ticket (TGS) requests (event ID 4769) where the ticket encryption type is RC4-HMAC (0x17). RC4-encrypted TGS tickets are commonly targeted in Kerberoasting attacks for offline password cracking of service accounts. Machine account requests are excluded to reduce noise.
Target Ruleset
windows
Target Rule Type
Event Correlation (EQL)
Tested ECS Version
No response
Query
any where event.category: "authentication" and event.code: "4769" and winlog.event_data.Status: "0x0" and winlog.event_data.TicketEncryptionType: "0x17" and not winlog.event_data.ServiceName regex~ ".*\\$"
New fields required in ECS/data sources for this rule?
No response
Related issues or PRs
No response
References
No response
Redacted Example Data
No response