Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable Pass the Ticket.
Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Attackers may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-16 | Security and Privacy Attributes | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-17 | Remote Access | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-18 | Wireless Access | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-19 | Access Control for Mobile Devices | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-2 | Account Management | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-3 | Access Enforcement | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-5 | Separation of Duties | Protects | T1558 | Steal or Forge Kerberos Tickets | |
AC-6 | Least Privilege | Protects | T1558 | Steal or Forge Kerberos Tickets | |
CA-7 | Continuous Monitoring | Protects | T1558 | Steal or Forge Kerberos Tickets | |
CM-2 | Baseline Configuration | Protects | T1558 | Steal or Forge Kerberos Tickets |
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1558.004 | AS-REP Roasting | 22 |
T1558.001 | Golden Ticket | 13 |
T1558.003 | Kerberoasting | 23 |
T1558.002 | Silver Ticket | 20 |