EXPLORE
← Back to Explore
T1558

Steal or Forge Kerberos Tickets

Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](https://attack.mitre.org/techniques/T1550/003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the ...

WindowsLinuxmacOS
25
Detections
3
Sources
1
Threat Actors

BY SOURCE

14elastic6splunk_escu5sigma

PROCEDURES (18)

Unusual3 detections

Auto-extracted: 3 detections for unusual

Mimikatz2 detections

Auto-extracted: 2 detections for mimikatz

Privilege2 detections

Auto-extracted: 2 detections for privilege

Lateral2 detections

Auto-extracted: 2 detections for lateral

Powershell2 detections

Auto-extracted: 2 detections for powershell

Event Log2 detections

Auto-extracted: 2 detections for event log

Persist1 detections

Auto-extracted: 1 detections for persist

Dump1 detections

Auto-extracted: 1 detections for dump

Kerbero1 detections

Auto-extracted: 1 detections for kerbero

Privilege1 detections

Auto-extracted: 1 detections for privilege

Service1 detections

Auto-extracted: 1 detections for service

Persist1 detections

Auto-extracted: 1 detections for persist

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Credential1 detections

Auto-extracted: 1 detections for credential

Persist1 detections

Auto-extracted: 1 detections for persist

Credential1 detections

Auto-extracted: 1 detections for credential

Kerbero1 detections

Auto-extracted: 1 detections for kerbero

Dump1 detections

Auto-extracted: 1 detections for dump

THREAT ACTORS (1)

DETECTIONS (25)