heroui logo

Suspicious Kerberos Authentication Ticket Request

Elastic Detection Rules

View Source
Summary
The rule detects suspicious Kerberos Authentication Ticket Requests by correlating network traffic on the standard Kerberos port (88) with unusual processes on the source machine, as well as authentication events from the target domain controller. It focuses on processes other than the expected `lsass.exe`, providing an effective way to identify potential attacks or misuse of Kerberos tickets and accounts. Key investigation strategies include reviewing the process execution chain, examining other alerts related to the user or host, checking the destination IP against known Domain Controllers, and analyzing specific event IDs associated with ticket requests. Remediation steps advise isolating affected hosts, investigating credential exposure, and running full antimalware scans to identify and eliminate any malicious remnants in the system. The rule is categorized as high severity, reflecting its importance in identifying lateral movement and credential access attempts in a Windows environment, relevant for maintaining Active Directory security.
Categories
  • Endpoint
  • Identity Management
  • Windows
Data Sources
  • Network Traffic
  • Windows Registry
  • Active Directory
  • Windows Registry
ATT&CK Techniques
  • T1550
  • T1550.003
  • T1558
  • T1558.003
Created: 2025-10-28