Prerequisites for possible attack
- Attacker
already possess an account in domain
- Attacker
has access to KDC
- Targeted
account must have SPN
Attack path:
- Attacker
logs in with account A
- Attacker
request TGS against account B that has SPN, using SPN to obtain ticket
- Attacker
dumps the ticket and crack it offline
- Attacker
knows password of user B
Prevention:
- Strong
passwords
- Disable
RC4 encryption support for Kerberos tickets (this can be done on DC side
and/or user account side)
- On
DCs, use GPO to disable RC4 support “Security Options -> Network
security: Configure encryption types allowed for Kerberos”
- On
user account, attribute msDS-SupportedEncryptionsTypes
- Normal
account should NOT have SPNs
- Use
gMSA so password is random and strong
Detection:
- Spikes
in EventID 4769 for same SPN
- Spikes
in EventID 4769 from a normal user account