GLITCH
  • Who Am I ?
  • WRITEUPS
    • CyberDefenders Labs
      • PhishStrike Write-up
      • OpenWire Write-up
      • BlueSky Ransomware Write-up
      • PsExec Hunt Write-up
      • Red Stealer Write-up
      • Amadey Write-up
      • GrabThePhisher Write-up
      • BlackEnergy Write-up
  • SUMMARIEs
    • Phishing
    • Kerberos_AD
    • Bug Hunting
    • MITRE
  • OSEP
  • GLITCH HUB
    • Books
    • Courses
      • Youtube
    • Githubs
    • Tools
    • Bookmarks
  • Projects
    • Youtube Downloader
  • Malware Analysis
    • SOON!
Powered by GitBook
On this page
  • Kerberos process:
  • Kerberoasting: definition:
  • As-rep Roasting: definition:
  • Pass the ticket: definition:
  • Silver Ticket: definition:
  • Golden Ticket: definition:
  1. SUMMARIEs

Kerberos_AD

Kerberos process:

C1. AS-REG1 -> Ticket Flags + username - service name (TGT) + Realm

K2. Preauth-Required -> stime + salt + error code

C3. AS-REG2 (TGT) -> cname + sname + timestamp <- encrypted with user's hash

K4. AS-REP (TGT):

-> session key: sname + realm <- Encrypted using user's hash

-> TGT: username + Realm + Session key + Timestamp + Lifetime + PAC data <- Encrypted using krbtgt key

C5. TGS-REG (TGS):

-> TGS-REG: sname + SPN -> TGT <- Encrypted using krbtgt key

-> TGT <- Encrypted using krbtgt key

-> Authenticator: username + timestamp <- Encrypted using session key

K6. TGS-REP (TGS):

-> service session key: sname + realm <- Encrypted using session key

-> TGS: username + realm + service session key + timestamp + lifetime + PAC data <- Encrypted using sql service key

C7. AP-REG (TGS):

-> Authenticator: username + timestamp <- Encrypted using service session key

-> TGS <- Encrypted using sql service key

S8. AP-REP -> DONE


Kerberoasting: definition:

  • request RC4 encryption when performing the attack and initiating TGS-REQ requests. This is because RC4 is weaker

Detect:

  • 4769: A Kerberos service ticket (TGS) was requested

  • 4770: A Kerberos service ticket was renewed

  • 0x40810000 & 0x17

  • Looking for TGS-REQ packets with RC4 encryption

  • powershell => solution: 400 & 800 & logging solution: 4100, 4103, 4104


As-rep Roasting: definition:

  • Adversaries may reveal credentials of accounts that have disabled Kerberos preauthentication by Password Cracking Kerberos messages

Detect:

  • Windows Event ID 4768: Kerberos authentication ticket (TGT) was requested

  • Event ID: 4771 - Kerberos Pre-Authentication Failed

  • Code: 0x19


Pass the ticket: definition:

  • Exploits Kerberos authentication tickets, allowing an attacker to use the identity associated with the ticket to access network resources without needing the user's password

Detect:

  • Event ID 4624 (An account was successfully logged on) Logon Type 3


Pass the hash: definition:

  • Use password hashes (NTLM hashes) for authentication instead of the password itself.

Detect:

  • Event ID 4624 (An account was successfully logged on) Logon Type 3


Silver Ticket: definition:

  • Exploits specific privileges within the Windows network. In this attack, the attacker obtains a forged service ticket (TGS) to access certain services within the Active Directory environment without having to interact with the Key Distribution Center (KDC).

Golden Ticket: definition:

  • It is a forged TGT that an attacker can create after obtaining the Kerberos keys. They can be used to access any service within the network without having to log in legitimately.

PreviousPhishingNextBug Hunting

Last updated 6 months ago