Microsoft-Windows-Security-Auditing › Event 4768

Event ID 4768 — A Kerberos authentication ticket (TGT) was requested.

Provider
Microsoft-Windows-Security-Auditing
Channel
Security
Audit Policy
Account Logon → Kerberos Authentication Service
Collection Priority
Recommended (Palantir, others)
Opcode
Info

Description

A Kerberos authentication ticket (TGT) was requested.

Message #

A Kerberos authentication ticket (TGT) was requested.

Account Information:
	Account Name: %1
	Supplied Realm Name: %2
	User ID: %3

Service Information:
	Service Name: %4
	Service ID: %5

Network Information:
	Client Address: %10
	Client Port: %11

Additional Information:
	Ticket Options: %6
	Result Code: %7
	Ticket Encryption Type: %8
	Pre-Authentication Type: %9

Certificate Information:
	Certificate Issuer Name: %12
	Certificate Serial Number: %13
	Certificate Thumbprint: %14

Certificate information is only provided if a certificate was used for pre-authentication.

Pre-authentication types, ticket options, encryption types and result codes are defined in RFC 4120.

Fields #

NameDescription
Account_Name[Account Information] Account Name.
Supplied_Realm_Name[Account Information] Supplied Realm Name.
User_ID[Account Information] User ID.
Service_Name[Service Information] Service Name.
Service_ID[Service Information] Service ID.
Ticket_Options[Additional Information] Ticket Options.
Bitmask flags
0x40000000
Forwardable
0x20000000
Forwarded
0x10000000
Proxiable
0x08000000
Proxy
0x04000000
Allow-postdate
0x02000000
Postdated
0x01000000
Renewable
0x00800000
Opt-hardware-auth
0x00400000
Canonicalize
0x00000010
Renewable-ok
0x00000008
Enc-tkt-in-skey
0x00000002
Renew
0x00000001
Validate
Result_Code[Additional Information] Result Code.
Known values
0x0
KDC_ERR_NONE (Success)
0x1
KDC_ERR_NAME_EXP
0x2
KDC_ERR_SERVICE_EXP
0x3
KDC_ERR_BAD_PVNO
0x6
KDC_ERR_C_PRINCIPAL_UNKNOWN
0x7
KDC_ERR_S_PRINCIPAL_UNKNOWN
0x9
KDC_ERR_NULL_KEY
0xA
KDC_ERR_CANNOT_POSTDATE
0xC
KDC_ERR_POLICY
0xD
KDC_ERR_BADOPTION
0xE
KDC_ERR_ETYPE_NOSUPP
0x12
KDC_ERR_CLIENT_REVOKED
0x17
KDC_ERR_KEY_EXPIRED
0x18
KDC_ERR_PREAUTH_FAILED
0x19
KDC_ERR_PREAUTH_REQUIRED
0x1F
KRB_AP_ERR_BAD_INTEGRITY
0x20
KRB_AP_ERR_TKT_EXPIRED
0x21
KRB_AP_ERR_TKT_NYV
0x22
KRB_AP_ERR_REPEAT
0x25
KRB_AP_ERR_SKEW
0x29
KRB_AP_ERR_BADADDR
0x3C
KRB_ERR_GENERIC
0x44
KRB_ERR_WRONG_REALM
0x00000000
STATUS_SUCCESS
0xC0000002
STATUS_NOT_IMPLEMENTED
0xC0000005
STATUS_ACCESS_VIOLATION
0xC0000008
STATUS_INVALID_HANDLE
0xC000000D
STATUS_INVALID_PARAMETER
0xC0000017
STATUS_NO_MEMORY
0xC0000022
STATUS_ACCESS_DENIED
0xC0000034
STATUS_OBJECT_NAME_NOT_FOUND
0xC0000035
STATUS_OBJECT_NAME_COLLISION
0xC000003A
STATUS_OBJECT_PATH_NOT_FOUND
0xC0000043
STATUS_SHARING_VIOLATION
0xC0000056
STATUS_DELETE_PENDING
0xC000005E
STATUS_NO_LOGON_SERVERS
0xC0000061
STATUS_PRIVILEGE_NOT_HELD
0xC0000062
STATUS_INVALID_ACCOUNT_NAME
0xC0000064
STATUS_NO_SUCH_USER
0xC0000065
STATUS_GROUP_EXISTS
0xC0000066
STATUS_NO_SUCH_GROUP
0xC0000067
STATUS_MEMBER_IN_GROUP
0xC0000068
STATUS_MEMBER_NOT_IN_GROUP
0xC000006A
STATUS_WRONG_PASSWORD
0xC000006B
STATUS_ILL_FORMED_PASSWORD
0xC000006C
STATUS_PASSWORD_RESTRICTION
0xC000006D
STATUS_LOGON_FAILURE
0xC000006E
STATUS_ACCOUNT_RESTRICTION
0xC000006F
STATUS_INVALID_LOGON_HOURS
0xC0000070
STATUS_INVALID_WORKSTATION
0xC0000071
STATUS_PASSWORD_EXPIRED
0xC0000072
STATUS_ACCOUNT_DISABLED
0xC0000073
STATUS_NONE_MAPPED
0xC0000074
STATUS_TOO_MANY_LUIDS_REQUESTED
0xC0000076
STATUS_INVALID_SUB_AUTHORITY
0xC0000077
STATUS_INVALID_ACL
0xC0000078
STATUS_INVALID_SID
0xC0000079
STATUS_INVALID_SECURITY_DESCR
0xC000007C
STATUS_NO_TOKEN
0xC000009A
STATUS_INSUFFICIENT_RESOURCES
0xC00000A5
STATUS_BAD_IMPERSONATION_LEVEL
0xC00000BB
STATUS_NOT_SUPPORTED
0xC00000CC
STATUS_BAD_NETWORK_NAME
0xC00000DC
STATUS_INVALID_SERVER_STATE
0xC00000E5
STATUS_INTERNAL_ERROR
0xC00000ED
STATUS_NOT_LOGON_PROCESS
0xC0000106
STATUS_NAME_TOO_LONG
0xC000010A
STATUS_PROCESS_IS_TERMINATING
0xC0000120
STATUS_CANCELLED
0xC0000121
STATUS_CANNOT_DELETE
0xC0000133
STATUS_TIME_DIFFERENCE_AT_DC
0xC000015B
STATUS_LOGON_TYPE_NOT_GRANTED
0xC000018A
STATUS_NO_TRUST_LSA_SECRET
0xC000018B
STATUS_NO_TRUST_SAM_ACCOUNT
0xC000018C
STATUS_TRUSTED_DOMAIN_FAILURE
0xC000018D
STATUS_TRUSTED_RELATIONSHIP_FAILURE
0xC0000190
STATUS_TRUST_FAILURE
0xC0000192
STATUS_NETLOGON_NOT_STARTED
0xC0000193
STATUS_ACCOUNT_EXPIRED
0xC0000198
STATUS_NOLOGON_INTERDOMAIN_TRUST_ACCOUNT
0xC0000199
STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT
0xC000019A
STATUS_NOLOGON_SERVER_TRUST_ACCOUNT
0xC0000224
STATUS_PASSWORD_MUST_CHANGE
0xC0000225
STATUS_NOT_FOUND
0xC0000233
STATUS_DOMAIN_CONTROLLER_NOT_FOUND
0xC0000234
STATUS_ACCOUNT_LOCKED_OUT
0xC0000236
STATUS_CONNECTION_REFUSED
0xC000035B
STATUS_BAD_BINDINGS
0xC0000380
STATUS_SMARTCARD_WRONG_PIN
0xC0000381
STATUS_SMARTCARD_CARD_BLOCKED
0xC0000386
STATUS_SMARTCARD_NO_KEYSET
0xC0000387
STATUS_SMARTCARD_IO_ERROR
0xC0000388
STATUS_DOWNGRADE_DETECTED
0xC0000389
STATUS_SMARTCARD_CERT_REVOKED
0xC0000408
STATUS_USER2USER_REQUIRED
0xC0000409
STATUS_STACK_BUFFER_OVERRUN
0xC0000413
STATUS_AUTHENTICATION_FIREWALL_FAILED
Ticket_Encryption_Type[Additional Information] Ticket Encryption Type.
Known values
0x1
DES-CBC-CRC
0x3
DES-CBC-MD5
0x11
AES128-CTS-HMAC-SHA1-96
0x12
AES256-CTS-HMAC-SHA1-96
0x17
RC4-HMAC
0x18
RC4-HMAC-EXP
0xFFFFFFFF
Unspecified
PreAuthentication_Type[Additional Information] Pre-Authentication Type.
Known values
0
PA-NONE
2
PA-ENC-TIMESTAMP
11
PA-ETYPE-INFO
14
PA-PK-AS-REQ-OLD
15
PA-PK-AS-REQ
16
PA-PK-AS-REP
17
PA-ETYPE-INFO2
19
PA-ETYPE-INFO2
20
PA-SVR-REFERRAL-INFO
128
PA-SUPPORTED-ENCTYPES
129
PA-PAC-OPTIONS
165
PA-SPAKE
Client_Address[Network Information] Client Address.
Client_Port[Network Information] Client Port.
Certificate_Issuer_Name[Certificate Information] Certificate Issuer Name.
Certificate_Serial_Number[Certificate Information] Certificate Serial Number.
Certificate_Thumbprint[Certificate Information] Certificate Thumbprint.

Example Event #

{
  "system": {
    "provider": "Microsoft-Windows-Security-Auditing",
    "guid": "54849625-5478-4994-A5BA-3E3B0328C30D",
    "event_source_name": "",
    "event_id": 4768,
    "version": 0,
    "level": 0,
    "task": 14339,
    "opcode": 0,
    "keywords": 9227875636482146304,
    "time_created": "2020-07-22T20:29:36.414827Z",
    "event_record_id": 887107,
    "correlation": {},
    "execution": {
      "process_id": 568,
      "thread_id": 2476
    },
    "channel": "Security",
    "computer": "01566s-win16-ir.threebeesco.com",
    "security": {
      "user_id": ""
    }
  },
  "event_data": {
    "TargetUserName": "HD01",
    "TargetDomainName": "CONTOSO.COM",
    "TargetSid": "S-1-0-0",
    "ServiceName": "krbtgt/CONTOSO.COM",
    "ServiceSid": "S-1-0-0",
    "TicketOptions": "0x10",
    "Status": "0x6",
    "TicketEncryptionType": "0xffffffff",
    "PreAuthType": "-",
    "IpAddress": "172.16.66.1",
    "IpPort": "55961",
    "CertIssuerName": "",
    "CertSerialNumber": "",
    "CertThumbprint": ""
  }
}

Detection Patterns #

Community Notes #

Kerberos TGT request (consider Pass-the-Ticket, Golden TGT attacks). Requests from a non-interactive source prior to 4769 may indicate ticket replay or Pass-the-Ticket staging.

Detection Rules #

View all rules referencing this event →

Sigma # view in reference

  • Potential AS-REP Roasting via Kerberos TGT Requests source medium: Detects suspicious Kerberos TGT requests with pre-authentication disabled (Pre-Authentication Type = 0) and Ticket Encryption Type (0x17) i.e, RC4-HMAC. This may indicate an AS-REP Roasting attack, where attackers request AS-REP messages for accounts without pre-authentication and attempt to crack the encrypted ticket offline to recover user passwords.
  • PetitPotam Suspicious Kerberos TGT Request source high: Detect suspicious Kerberos TGT requests. Once an attacer obtains a computer certificate by abusing Active Directory Certificate Services in combination with PetitPotam, the next step would be to leverage the certificate for malicious purposes. One way of doing this is to request a Kerberos Ticket Granting Ticket using a tool like Rubeus. This request will generate a 4768 event with some unusual fields depending on the environment. This analytic will require tuning, we recommend filtering Account_Name to the Domain Controller computer accounts.

Splunk # view in reference

  • Kerberos TGT Request Using RC4 Encryption source: The following analytic detects a Kerberos Ticket Granting Ticket (TGT) request using RC4-HMAC encryption (type 0x17) by leveraging Event 4768. This encryption type is outdated and its presence may indicate an OverPass The Hash attack. Monitoring this activity is crucial as it can signify credential theft, allowing adversaries to authenticate to the Kerberos Distribution Center (KDC) using a stolen NTLM hash. If confirmed malicious, this could enable unauthorized access to systems and resources, potentially leading to lateral movement and further compromise within the network.
  • Kerberos User Enumeration source: The following analytic detects an unusual number of Kerberos Ticket Granting Ticket (TGT) requests for non-existing users from a single source endpoint. It leverages Event ID 4768 and identifies anomalies using the 3-sigma statistical rule. This behavior is significant as it may indicate an adversary performing a user enumeration attack against Active Directory. If confirmed malicious, the attacker could validate a list of usernames, potentially leading to further attacks such as brute force or credential stuffing, compromising the security of the environment.
  • PetitPotam Suspicious Kerberos TGT Request source: The following analytic detects a suspicious Kerberos Ticket Granting Ticket (TGT) request, identified by Event Code 4768. This detection leverages Windows Security Event Logs to identify TGT requests with unusual fields, which may indicate the use of tools like Rubeus following the exploitation of CVE-2021-36942 (PetitPotam). This activity is significant as it can signal an attacker leveraging a compromised certificate to request Kerberos tickets, potentially leading to unauthorized access. If confirmed malicious, this could allow attackers to escalate privileges and persist within the environment, posing a severe security risk.
Show 5 more (8 total)
  • Windows Computer Account Requesting Kerberos Ticket source: The following analytic detects a computer account requesting a Kerberos ticket, which is unusual as typically user accounts request these tickets. This detection leverages Windows Security Event Logs, specifically EventCode 4768, to identify instances where the TargetUserName ends with a dollar sign ($), indicating a computer account. This activity is significant because it may indicate the use of tools like KrbUpRelay or other Kerberos-based attacks. If confirmed malicious, this could allow attackers to impersonate computer accounts, potentially leading to unauthorized access and lateral movement within the network.
  • Windows Multiple Disabled Users Failed To Authenticate Wth Kerberos source: The following analytic detects a single source endpoint failing to authenticate with 30 unique disabled domain users using the Kerberos protocol within 5 minutes. It leverages Windows Security Event 4768, focusing on failure code `0x12`, indicating revoked credentials. This activity is significant as it may indicate a Password Spraying attack targeting disabled accounts, a tactic used by adversaries to gain initial access or elevate privileges. If confirmed malicious, this could lead to unauthorized access or privilege escalation within the Active Directory environment, posing a severe security risk.
  • Windows Multiple Invalid Users Fail To Authenticate Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate with 30 unique invalid domain users using the Kerberos protocol. This detection leverages EventCode 4768, specifically looking for failure code 0x6, indicating the user is not found in the Kerberos database. This activity is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this could lead to unauthorized access or privilege escalation within the Active Directory environment, posing a significant security risk.
  • Windows Unusual Count Of Disabled Users Failed Auth Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate with multiple disabled domain users using the Kerberos protocol. It leverages EventCode 4768, which is generated when the Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT) and detects failure code `0x12` (credentials revoked). This behavior is significant as it may indicate a Password Spraying attack targeting disabled accounts, potentially leading to initial access or privilege escalation. If confirmed malicious, attackers could gain unauthorized access or elevate privileges within the Active Directory environment.
  • Windows Unusual Count Of Invalid Users Fail To Auth Using Kerberos source: The following analytic identifies a source endpoint failing to authenticate with multiple invalid domain users using the Kerberos protocol. It leverages Event ID 4768, which is generated when the Key Distribution Center issues a Kerberos Ticket Granting Ticket (TGT) and detects failure code 0x6, indicating the user is not found in the Kerberos database. This behavior is significant as it may indicate a Password Spraying attack, where an adversary attempts to gain initial access or elevate privileges. If confirmed malicious, this activity could lead to unauthorized access and potential privilege escalation within the Active Directory environment.

Kusto Query Language # view in reference

References #