Detecting Golden Tickets/Silver Tickets
Golden Ticket
Attack Steps
Detection Opportunities
Example Splunk Query: Detecting Golden Tickets
index=main earliest=1690451977 latest=1690452262 source="WinEventLog:Security" user!=*$ EventCode IN (4768,4769,4770)
| rex field=user "(?<username>[^@]+)"
| rex field=src_ip "(\:\:ffff\:)?(?<src_ip_4>[0-9\.]+)"
| transaction username, src_ip_4 maxspan=10h keepevicted=true startswith=(EventCode=4768)
| where closed_txn=0
| search NOT user="*$@*"
| table _time, ComputerName, username, src_ip_4, service_name, categorySilver Ticket
Attack Steps
Detection Opportunities
Example Splunk Queries for Silver Ticket Detection
Query 1: Comparing Created Users with Logged-in Users
Query 2: Detecting Special Privileges on New Logon Events
Summary
PreviousDetecting Overpass-the-HashNextDetecting Unconstrained Delegation/Constrained Delegation Attacks
Last updated