Windows Kerberoasting RC4 encrypted tickets

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects Kerberoasting attacks targeting service accounts through requests for RC4-encrypted Kerberos service tickets.

Strategy

This rule monitors Windows Security Audit events where @evt.id is 4769 for successful Kerberos service ticket requests with @Event.EventData.Data.Status of 0x0 and @Event.EventData.Data.TicketEncryptionType of 0x17 (RC4). The detection excludes requests for krbtgt service tickets and computer accounts (ending in $). Kerberoasting attacks specifically request RC4-encrypted service tickets because RC4 hashes are easier to crack offline compared to AES encryption. Attackers use this technique to obtain service account password hashes that can be cracked to gain access to privileged service accounts.

Triage and response

  • Examine the requesting user account and service being targeted to determine if the ticket request represents legitimate service authentication on {{host}}.
  • Check if the service account has a weak password that could be susceptible to offline cracking attempts.
  • Review the requesting user’s recent activity patterns to identify potential signs of account compromise or unauthorized access.
  • Analyze authentication logs for unusual service ticket request volumes or patterns that may indicate automated Kerberoasting tools.
  • Consider rotating passwords for service accounts that were targeted and implementing strong password policies or managed service accounts.