Dark Mode
Capec-652 Detail
Use of Known Kerberos Credentials
Standard Software Likelihood: Medium Typical Severity: High
Parents: 560
Children: 509 645
Threats: T71 T75 T279 T283 T385 T388 T398 T402
Explore
-
Acquire known Kerberos credentials: The adversary must obtain known Kerberos credentials in order to access the target system, application, or service within the domain.
| Techniques |
|---|
| An adversary purchases breached Kerberos service account username/password combinations or leaked hashed passwords from the dark web. |
| An adversary guesses the credentials to a weak Kerberos service account. |
| An adversary conducts a sniffing attack to steal Kerberos tickets as they are transmitted. |
| An adversary conducts a Kerberoasting attack. |
Experiment
-
Attempt Kerberos authentication: Try each Kerberos credential against various resources within the domain until the target grants access.
| Techniques |
|---|
| Manually or automatically enter each Kerberos service account credential through the target's interface. |
| Attempt a Pass the Ticket attack. |
Exploit
-
Impersonate: An adversary can use successful experiments or authentications to impersonate an authorized user or system, or to laterally move within the domain
-
Spoofing: Malicious data can be injected into the target system or into other systems on the domain. The adversary can also pose as a legitimate domain user to perform social engineering attacks.
-
Data Exfiltration: The adversary can obtain sensitive data contained within domain systems or applications.
- The system/application leverages Kerberos authentication.
- The system/application uses one factor password-based authentication, SSO, and/or cloud-based authentication for Kerberos service accounts.
- The system/application does not have a sound password policy that is being enforced for Kerberos service accounts.
- The system/application does not implement an effective password throttling mechanism for authenticating to Kerberos service accounts.
- The targeted network allows for network sniffing attacks to succeed.
- A valid Kerberos ticket or a known Kerberos service account credential.
| Low |
|---|
| Once an adversary obtains a known Kerberos credential, leveraging it is trivial. |
| Integrity | Authorization | Access Control | Authentication | Confidentiality |
|---|---|---|---|---|
| Modify Data | Read Data | Gain Privileges | Gain Privileges | Gain Privileges |
| Read Data |
- Bronze Butler (also known as Tick), has been shown to leverage forged Kerberos Ticket Granting Tickets (TGTs) and Ticket Granting Service (TGS) tickets to maintain administrative access on a number of systems. [REF-584]
- PowerSploit's Invoke-Kerberoast module can be leveraged to request Ticket Granting Service (TGS) tickets and return crackable ticket hashes. [REF-585] [REF-586]