- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Classification:
attack
Tactic:
Technique:
Detects potential privilege escalation attempts using local Kerberos relay attacks over LDAP.
This detection monitors Windows event logs for successful logon events with specific characteristics of Kerberos relay attacks. The detection looks for Event ID 4624 (successful logon) with Kerberos authentication from the loopback address (127.0.0.1) targeting privileged accounts. It specifically filters for logon type 3 (network logon), Kerberos authentication, a non-zero IP port, and a target SID matching the local Administrator account pattern.
The technique exploits Windows authentication mechanisms to relay Kerberos tickets locally, potentially granting attackers elevated privileges. By monitoring for Kerberos authentication from the loopback address that targets administrator accounts, we can identify attempts to leverage this technique for privilege escalation.
{{host}}
where the suspicious Kerberos authentication occurred.