Detecting Unconstrained Delegation/Constrained Delegation Attacks
Unconstrained Delegation
Attack Steps
Detection Opportunities
Example Splunk Query: Detecting Unconstrained Delegation Attacks
index=main earliest=1690544538 latest=1690544540 source="WinEventLog:Microsoft-Windows-PowerShell/Operational" EventCode=4104 Message="*TrustedForDelegation*" OR Message="*userAccountControl:1.2.840.113556.1.4.803:=524288*"
| table _time, ComputerName, EventCode, MessageConstrained Delegation
Attack Steps
Detection Opportunities
Example Splunk Query: Detecting Constrained Delegation Discovery with PowerShell Logs
Example Splunk Query: Detecting Constrained Delegation with Sysmon Logs
Summary
Last updated