heroui logo

Replay Attack Detected

Sigma Rules

View Source
Summary
This detection rule identifies potential Kerberos Replay Attacks on domain controllers by monitoring for specific Event ID 4649 logs, which indicate the occurrence of a "KRB_AP_ERR_REPEAT" response sent to a client. Such responses typically signify an attempt to repeat a previous authentication exchange, commonly associated with replay attack techniques. The context of this detection involves analyzing security logs for authentication failures that suggest an attacker is trying to exploit legitimate authentication tokens. The rule aims to enhance security postures by asserting that any authentication queries yielding this error should be investigated for malicious intent, particularly in scenarios where the movements of authenticated users can be replicated by an attacker leveraging captured tokens.
Categories
  • Windows
  • Network
Data Sources
  • Windows Registry
  • Logon Session
  • Application Log
Created: 2022-10-14