GetUserSPN.py/Kerberoasting
Last updated
Last updated
Contains the filter "servicePrincipalName=*" in the python script. This filter is commonly used to detect kerberoasting.
4769 - A kerberos service ticket was requested. Event ID will be present on domain controller whenever the TA requests TGS.
The TA requesting multiple TGSs from SPNs at once can be detected on the Domain Controller.
While the account has AES enabled, so we shouldn’t expect to see RC4 encryption (0x17) in the event logs. This could trigger an alert.
Encryption type: 0x17 = RC4