
Summary
The analytic rule detects the use of PowerShell to query for Service Principal Names (SPNs) within a domain, utilizing Script Block Logging (EventCode 4104). This behavior is significant as querying for SPNs often serves as a precursor to kerberoasting and silver ticket attacks, both tactics aimed at credential theft and privilege escalation. By monitoring for the KerberosRequestorSecurityToken class in PowerShell script blocks, this rule helps identify potentially malicious activity that could compromise security. Organizations should have PowerShell Script Block Logging enabled to effectively capture and analyze relevant events, which empowers them to respond quickly to potential threats.
Categories
- Endpoint
- Identity Management
Data Sources
- Persona
- Pod
ATT&CK Techniques
- T1558
- T1558.003
- T1059.001
Created: 2024-11-13