Kerberoasting๐
The Kerberoasting Detector identifies a possible Kerberos Ticket Granting Service (TGS) Service Ticket (ST) attack where a threat actor gathers, extracts, and cracks account password hashes offline in order to recover plaintext passwords. Its main advantage is that it allows a regular user to obtain credentials to a service account that has domain admin privileges without interacting with the target system.

Requirements๐
This detector requires the following data sources, integrations, or schemas:
- Auth
Inputs๐
Detections are from the following normalized sources:
- Auth
Outputs๐
Detections from this detector are pushed to the XDR Detection Database and Detection Triage Dashboard.
Configuration Options๐
This detector is enabled by default when the required data sources or integrations are available in the tenant.
MITRE ATT&CK Category๐
- MITRE Enterprise ATT&CK - Credential Access - Steal or Forge Kerberos Tickets: Kerberoasting. For more information, see MITRE Technique T1558.003.
Detector Testing๐
This detector does not have a supported testing method, though an Advanced Search will verify if detections originated with this detector.
Note
If no supported testing method is available, an Advanced Search will show you if any detections came from this detector if a qualifying event was observed. A search with no results does not indicate the detector is not working. A lack of search results for the detector may only indicate that the specific attack has not been observed in the tenant. However, it could indicate the underlying data is not available. Ensure the required schemas are provided in Data Sources along with the supported device type(s) for that schema.
References๐
- Schemas