- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Detects Kerberoasting attacks targeting service accounts through requests for RC4-encrypted Kerberos service tickets.
This rule monitors Windows Security Audit events where @evt.id
is 4769
for successful Kerberos service ticket requests with @Event.EventData.Data.Status
of 0x0
and @Event.EventData.Data.TicketEncryptionType
of 0x17
(RC4). The detection excludes requests for krbtgt
service tickets and computer accounts (ending in $
). Kerberoasting attacks specifically request RC4-encrypted service tickets because RC4 hashes are easier to crack offline compared to AES encryption. Attackers use this technique to obtain service account password hashes that can be cracked to gain access to privileged service accounts.
{{host}}
.