Detecting Kerberoasting/AS-REProasting
Overview of Kerberoasting
Kerberoasting Attack Steps:
Detection Opportunities for Kerberoasting
Detecting Kerberoasting With Splunk
Example 1: Detecting Benign TGS Requests
index=main earliest=1690388417 latest=1690388630 EventCode=4648 OR (EventCode=4769 AND service_name=iis_svc)
| dedup RecordNumber
| rex field=user "(?<username>[^@]+)"
| table _time, ComputerName, EventCode, name, username, Account_Name, Account_Domain, src_ip, service_name, Ticket_Options, Ticket_Encryption_Type, Target_Server_Name, Additional_InformationExample 2: Detecting Kerberoasting Through SPN Querying
Example 3: Detecting TGS Requests Without Logon Events
Detecting AS-REPRoasting
Detection Opportunities for AS-REPRoasting
Detecting AS-REPRoasting With Splunk
Example 1: Querying Accounts With Pre-Auth Disabled
Example 2: TGT Requests for Accounts With Pre-Auth Disabled
Explanation of Splunk Search Components
Last updated