Skip to content

Blumira/Kerberoast-Detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 

Repository files navigation

This script serves 2 purposes:

  1. Automation for creating a Kerberos service account honey credential.
  2. Automation for creating an account with pre-authentication enabled as a second honey account to detect AS-REP Roasting.

Kerberoasting:

Threat actors can abuse the kerberos protocol to recover passwords related to service accounts using a tactic called Kerberoasting

In Kerberoasting threat actors abuse valid Kerberos ticket granting tickets to make a request for a ticket granting service from any valid service principal name (SPN) within your Microsoft Active-Directory domain, such ticket granting services are vulnerable to offline password cracking which can allow a threat actor to recover the plaintext password of the associated service account mapped by the SPN.

In order to avoid false positive detections you can create a service account honeypot to detect Kerberoasting:

Purpose:

Generate SPN artifacts for the purpose of detecting kerberoasting in otherwise noisy environments

Requirements:

  • This powershell script should be executed by a user account with privledges for creating Active directory accounts and SPN's

  • Auditing of Kerberos Service Ticket Operations must be enabled

  • An alerting mechanism (like Blumira clould SIEM) that will generate alerts related to matches of the following

    • Event ID: 4769
    • Encryption type: 0x17
    • Ticket options: 0x40810000
    • SPN Name: <Name of your honeycred / SPN name>

AS-Rep Roasting:

AS-REP Roasting is an attack against Kerberos for user accounts that do not require pre-authentication. Pre-authentication is the first step in Kerberos authentication, and is designed to prevent brute-force password guessing attacks.

Purpose:

Generate an account without pre-authentication for the purpose of detecting as-rep roasting in otherwise noisy environments

Requirements:

  • This powershell script should be executed by a user account with privledges for creating Active directory accounts and SPN's

  • Auditing of Kerberos Service Ticket Operations must be enabled

  • An alerting mechanism (like Blumira clould SIEM) that will generate alerts related to matches of the following

    • Event ID: 4768
    • Encryption type: 0x17
    • Ticket options: 0x40800010
    • Account Name: < Name of your honeycred >

Usage:

From an administrative powershell command prompt

.\DOGEMIRA.ps1

Releases

No releases published

Packages

 
 
 

Contributors 4

  •  
  •  
  •  
  •