Kerberos Pre-authentication Disabled for User
Identifies the modification of an account's Kerberos pre-authentication options. An adversary with GenericWrite/GenericAll rights over the account can maliciously modify these settings to perform offline password cracking attacks such as AS-REP roasting.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2022/01/24"
3integration = ["system", "windows"]
4maturity = "production"
5updated_date = "2024/10/28"
6min_stack_version = "8.14.0"
7min_stack_comments = "Breaking change at 8.14.0 for the Windows Integration."
8
9[rule]
10author = ["Elastic"]
11description = """
12Identifies the modification of an account's Kerberos pre-authentication options. An adversary with
13GenericWrite/GenericAll rights over the account can maliciously modify these settings to perform offline password
14cracking attacks such as AS-REP roasting.
15"""
16from = "now-9m"
17index = ["winlogbeat-*", "logs-system.*", "logs-windows.*"]
18language = "kuery"
19license = "Elastic License v2"
20name = "Kerberos Pre-authentication Disabled for User"
21note = """## Triage and analysis
22
23### Investigating Kerberos Pre-authentication Disabled for User
24
25Kerberos pre-authentication is an account protection against offline password cracking. When enabled, a user requesting access to a resource initiates communication with the Domain Controller (DC) by sending an Authentication Server Request (AS-REQ) message with a timestamp that is encrypted with the hash of their password. If and only if the DC is able to successfully decrypt the timestamp with the hash of the user’s password, it will then send an Authentication Server Response (AS-REP) message that contains the Ticket Granting Ticket (TGT) to the user. Part of the AS-REP message is signed with the user’s password. Microsoft's security monitoring [recommendations](https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4738) state that `'Don't Require Preauth' – Enabled` should not be enabled for user accounts because it weakens security for the account’s Kerberos authentication.
26
27AS-REP roasting is an attack against Kerberos for user accounts that do not require pre-authentication, which means that if the target user has pre-authentication disabled, an attacker can request authentication data for it and get a TGT that can be brute-forced offline, similarly to Kerberoasting.
28
29#### Possible investigation steps
30
31- Identify the user account that performed the action and whether it should perform this kind of action.
32- Contact the account owner and confirm whether they are aware of this activity.
33- Determine if the target account is sensitive or privileged.
34- Inspect the account activities for suspicious or abnormal behaviors in the alert timeframe.
35
36### False positive analysis
37
38- Disabling pre-authentication is a bad security practice and should not be allowed in the domain. The security team should map and monitor any potential benign true positives (B-TPs), especially if the target account is privileged.
39
40### Response and remediation
41
42- Initiate the incident response process based on the outcome of the triage.
43- Reset the target account's password if there is any risk of TGTs having been retrieved.
44- Re-enable the preauthentication option or disable the target account.
45- Review the privileges assigned to the involved users to ensure that the least privilege principle is being followed.
46- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
47- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
48"""
49references = [
50 "https://harmj0y.medium.com/roasting-as-reps-e6179a65216b",
51 "https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4738",
52 "https://github.com/atc-project/atomic-threat-coverage/blob/master/Atomic_Threat_Coverage/Logging_Policies/LP_0026_windows_audit_user_account_management.md",
53]
54risk_score = 47
55rule_id = "e514d8cd-ed15-4011-84e2-d15147e059f1"
56setup = """## Setup
57
58The 'Audit User Account Management' logging policy must be configured for (Success, Failure).
59Steps to implement the logging policy with Advanced Audit Configuration:
Computer Configuration > Policies > Windows Settings > Security Settings > Advanced Audit Policies Configuration > Audit Policies > Account Management > Audit User Account Management (Success,Failure)
1"""
2severity = "medium"
3tags = [
4 "Domain: Endpoint",
5 "OS: Windows",
6 "Use Case: Threat Detection",
7 "Tactic: Credential Access",
8 "Tactic: Defense Evasion",
9 "Tactic: Privilege Escalation",
10 "Resources: Investigation Guide",
11 "Use Case: Active Directory Monitoring",
12 "Data Source: Active Directory",
13 "Data Source: System",
14]
15timestamp_override = "event.ingested"
16type = "query"
17
18query = '''
19event.code:4738 and winlog.api:"wineventlog" and message:"'Don't Require Preauth' - Enabled"
20'''
21
22
23[[rule.threat]]
24framework = "MITRE ATT&CK"
25[[rule.threat.technique]]
26id = "T1558"
27name = "Steal or Forge Kerberos Tickets"
28reference = "https://attack.mitre.org/techniques/T1558/"
29[[rule.threat.technique.subtechnique]]
30id = "T1558.004"
31name = "AS-REP Roasting"
32reference = "https://attack.mitre.org/techniques/T1558/004/"
33
34
35
36[rule.threat.tactic]
37id = "TA0006"
38name = "Credential Access"
39reference = "https://attack.mitre.org/tactics/TA0006/"
40[[rule.threat]]
41framework = "MITRE ATT&CK"
42[[rule.threat.technique]]
43id = "T1562"
44name = "Impair Defenses"
45reference = "https://attack.mitre.org/techniques/T1562/"
46
47
48[rule.threat.tactic]
49id = "TA0005"
50name = "Defense Evasion"
51reference = "https://attack.mitre.org/tactics/TA0005/"
52[[rule.threat]]
53framework = "MITRE ATT&CK"
54[[rule.threat.technique]]
55id = "T1078"
56name = "Valid Accounts"
57reference = "https://attack.mitre.org/techniques/T1078/"
58[[rule.threat.technique.subtechnique]]
59id = "T1078.002"
60name = "Domain Accounts"
61reference = "https://attack.mitre.org/techniques/T1078/002/"
62
63
64
65[rule.threat.tactic]
66id = "TA0004"
67name = "Privilege Escalation"
68reference = "https://attack.mitre.org/tactics/TA0004/"
Triage and analysis
Investigating Kerberos Pre-authentication Disabled for User
Kerberos pre-authentication is an account protection against offline password cracking. When enabled, a user requesting access to a resource initiates communication with the Domain Controller (DC) by sending an Authentication Server Request (AS-REQ) message with a timestamp that is encrypted with the hash of their password. If and only if the DC is able to successfully decrypt the timestamp with the hash of the user’s password, it will then send an Authentication Server Response (AS-REP) message that contains the Ticket Granting Ticket (TGT) to the user. Part of the AS-REP message is signed with the user’s password. Microsoft's security monitoring recommendations state that 'Don't Require Preauth' – Enabled
should not be enabled for user accounts because it weakens security for the account’s Kerberos authentication.
AS-REP roasting is an attack against Kerberos for user accounts that do not require pre-authentication, which means that if the target user has pre-authentication disabled, an attacker can request authentication data for it and get a TGT that can be brute-forced offline, similarly to Kerberoasting.
Possible investigation steps
- Identify the user account that performed the action and whether it should perform this kind of action.
- Contact the account owner and confirm whether they are aware of this activity.
- Determine if the target account is sensitive or privileged.
- Inspect the account activities for suspicious or abnormal behaviors in the alert timeframe.
False positive analysis
- Disabling pre-authentication is a bad security practice and should not be allowed in the domain. The security team should map and monitor any potential benign true positives (B-TPs), especially if the target account is privileged.
Response and remediation
- Initiate the incident response process based on the outcome of the triage.
- Reset the target account's password if there is any risk of TGTs having been retrieved.
- Re-enable the preauthentication option or disable the target account.
- Review the privileges assigned to the involved users to ensure that the least privilege principle is being followed.
- Investigate credential exposure on systems compromised or used by the attacker to ensure all compromised accounts are identified. Reset passwords for these accounts and other potentially compromised credentials, such as email, business systems, and web services.
- Using the incident response data, update logging and audit policies to improve the mean time to detect (MTTD) and the mean time to respond (MTTR).
References
Related rules
- FirstTime Seen Account Performing DCSync
- Potential Credential Access via DCSync
- Potential Shadow Credentials added to AD Object
- Sensitive Privilege SeEnableDelegationPrivilege assigned to a User
- User account exposed to Kerberoasting