Potential AS-REP Roasting via Kerberos TGT Requests
Detects suspicious Kerberos TGT requests with pre-authentication disabled (Pre-Authentication Type = 0) and Ticket Encryption Type (0x17) i.e, RC4-HMAC. This may indicate an AS-REP Roasting attack, where attackers request AS-REP messages for accounts without pre-authentication and attempt to crack the encrypted ticket offline to recover user passwords.
Sigma rule (View on GitHub)
1title: Potential AS-REP Roasting via Kerberos TGT Requests
2id: 3e2f1b2c-4d5e-11ee-be56-0242ac120002
3status: experimental
4description: |
5 Detects suspicious Kerberos TGT requests with pre-authentication disabled (Pre-Authentication Type = 0) and Ticket Encryption Type (0x17) i.e, RC4-HMAC.
6 This may indicate an AS-REP Roasting attack, where attackers request AS-REP messages for accounts without pre-authentication and attempt to crack the encrypted ticket offline to recover user passwords.
7references:
8 - https://medium.com/system-weakness/detecting-as-rep-roasting-attacks-b5b3965f9714
9 - https://www.picussecurity.com/resource/blog/as-rep-roasting-attack-explained-mitre-attack-t1558.004
10author: ANosir
11date: 2025-05-22
12logsource:
13 product: windows
14 service: security
15detection:
16 selection:
17 EventID: 4768
18 TicketEncryptionType: '0x17'
19 ServiceName: 'krbtgt'
20 Pre-AuthenticationType: 0
21 condition: selection
22falsepositives:
23 - Legacy systems or applications that legitimately use RC4 encryption
24 - Misconfigured accounts with pre-authentication disabled
25level: medium