
Summary
This rule detects suspicious Kerberos ticket requests initiated via the command line, utilizing the `System.IdentityModel.Tokens.KerberosRequestorSecurityToken` class. Such behavior is often exploited by threat actors who leverage command line tools to retrieve Kerberos tickets for service accounts. This tactic raises the risk of attacks like Kerberoasting, wherein offline password cracking attempts target the tickets, or silver ticket attacks, which further abuse the Kerberos authentication mechanism. The detection focuses on understanding process creation events, particularly those involving PowerShell and culminates in behavior that matches the specified command line parameters that indicate malicious intent. The detection logic looks to correlate both specific images and command lines to ascertain if a potentially illicit ticket request attempt has been made, providing administrators the means to respond to potential credential compromise scenarios.
Categories
- Endpoint
- Windows
- Network
Data Sources
- Process
ATT&CK Techniques
- T1558.003
Created: 2025-11-18