ATT&CK coverage › Technique
Steal or Forge Kerberos Tickets: Kerberoasting T1558.003
Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting service (TGS) ticket that may be vulnerable to Brute Force.
Events covered
10 catalog events are tagged with this technique by at least one rule.
Authoring guide
Patterns shared across the 21 rules above: which fields they filter on, what specific values they look for, and what they exclude. Field names are normalized across vendors so Sigma's Image, Elastic's process.name, and Splunk's process_name collapse into one row. Each rule contributes at most once per row.
Fields filtered most (20 distinct)
The fields most rules look at when detecting this technique. The How column shows the operators authors use (eq, wildcard, regex_match, match) and how often each appears. Sample values are concrete examples to start from, not an exhaustive list.
Top indicator values (121 distinct)
Specific (field, operator, value) combinations the rules check for, ranked by how many rules under this technique use each one. The Corpus reach column counts how many rules across the entire catalog (any technique) check the same combination. High numbers point to widely-used indicators that are likely noisy on their own; combine them with another condition for useful signal. Blank means the combination is specific to rules under this technique.
Rules under this technique
Every rule in the catalog tagged with this technique, grouped by vendor. Click a rule title for its full predicates, exclusions, and indicators.
Sigma 14 rules
- HackTool - KrbRelay Execution
- HackTool - KrbRelayUp Execution
- HackTool - RemoteKrbRelay Execution
- HackTool - Rubeus Execution
- HackTool - Rubeus Execution - ScriptBlock
- Kerberoasting Activity - Initial Query
- No Suitable Encryption Key Found For Generating Kerberos Ticket
- Potential SPN Enumeration Via Setspn.EXE
- Register new Logon Process by Rubeus
- Suspicious Kerberos RC4 Ticket Encryption
- Suspicious Kerberos Ticket Request via CLI
- Suspicious Kerberos Ticket Request via PowerShell Script - ScriptBlock
- Uncommon Outbound Kerberos Connection - Security
- User Couldn't Call a Privileged Service 'LsaRegisterLogonProcess'
Elastic 1 rule
Splunk 5 rules
- Kerberoasting spn request with RC4 encryption
- ServicePrincipalNames Discovery with PowerShell
- Unusual Number of Kerberos Service Tickets Requested
- Windows PowerView Kerberos Service Ticket Request
- Windows PowerView SPN Discovery