Kerberoasting Attack Investigation
When SIEM detects an unusual volume of Kerberos TGS ticket requests (Event ID 4769) with RC4 encryption from a single account, investigate for Kerberoasting. This Active Directory attack requests service tickets for accounts with Service Principal Names, then cracks them offline to obtain plaintext passwords. Used by APT29 (Cozy Bear), FIN7, and virtually every ransomware group that operates in Active Directory environments. The cracked service account passwords often provide domain admin access.
Overview
Kerberoasting exploits the Kerberos authentication protocol to extract service account password hashes without requiring elevated privileges. Any domain-authenticated user can request a Kerberos TGS (Ticket Granting Service) ticket for any service registered with a Service Principal Name (SPN). The ticket is encrypted with the service account password hash, which the attacker extracts and cracks offline. Because no privileged access is needed and the attack generates minimal noise, it is extremely popular.
APT29 used Kerberoasting in the SolarWinds campaign. FIN7 and Conti/Royal ransomware groups routinely Kerberoast as a privilege escalation step. The attack is dangerous because service accounts often have weak, never-rotated passwords and frequently have domain admin or database admin privileges.
When You See This
- 1
SIEM alert for a single user requesting TGS tickets (Event ID 4769) for multiple SPNs in a short window
- 2
Kerberos ticket requests with RC4 encryption type (0x17) rather than AES (0x12); attackers prefer RC4 because it is faster to crack
- 3
Security tooling detects Rubeus, Impacket GetUserSPNs, or PowerShell Kerberoasting scripts
- 4
Unusual account requesting TGS tickets for services it has never accessed before
Investigation Steps
- 1
Analyze the Kerberos ticket request pattern
Pull all Event ID 4769 (TGS ticket request) events from the suspect account. Count the number of unique SPNs requested, the time window, and the encryption type. Normal users rarely request more than 2-3 service tickets in a short period. Kerberoasting tools request tickets for all SPNs with a single command, often 50-200+ requests in seconds.
SIEMindex=windows EventCode=4769 Account_Name="suspect_user" | stats dc(Service_Name) as unique_services, count, earliest(_time) as started, latest(_time) as ended by Account_Name, Ticket_Encryption_Type | eval duration_sec=ended-started
index=windows EventCode=4769 Ticket_Encryption_Type=0x17 | stats dc(Service_Name) as services_requested, count by Account_Name | where services_requested > 5 | sort -services_requested
Decision Point
If: A single account requested TGS tickets for 10+ unique SPNs within minutes, especially with RC4 encryption
Yes → Confirmed Kerberoasting. The attacker has the ticket hashes and may be cracking them RIGHT NOW. Proceed to assess which service accounts are at risk.
No → May be legitimate admin activity or service discovery. Verify with the account owner.
- 2
Identify which service accounts were targeted
List all SPNs for which tickets were requested. Map each SPN to its service account. Assess the privilege level of each account; domain admin service accounts are the highest priority. Check password age for each service account; accounts with passwords unchanged for years are most likely to be cracked.
SIEMindex=windows EventCode=4769 Account_Name="suspect_user" | stats count by Service_Name, Service_ID | sort -count
- 3
Determine how the attacker gained initial access
Kerberoasting requires only a valid domain account; investigate how the attacker obtained one. Check for prior phishing, brute force, or credential theft events for the account performing the Kerberoasting. This reveals the full attack chain.
SIEMXDRindex=auth user="suspect_user" | stats count by action, src_ip, app | sort -_time | head 50
- 4
Assess if any service account passwords were compromised
Check for suspicious activity from the targeted service accounts AFTER the Kerberoasting event. If a service account suddenly authenticates from a new source or performs unusual actions, its password was likely cracked. Service accounts with weak passwords can be cracked in seconds to minutes.
SIEMindex=auth user IN ("svc_sql","svc_backup","svc_admin") action=success | where src_ip!="expected_service_host" | table _time, user, src_ip, app, action - 5
Contain and remediate
Immediately rotate passwords for all targeted service accounts; start with the most privileged ones. Use long, complex passwords (25+ characters) for service accounts. Disable the compromised user account. Consider implementing Group Managed Service Accounts (gMSA) which automatically rotate passwords. Add detection rules for future Kerberoasting attempts.
SIEM
Common Mistakes
- 1
Not checking the encryption type; legitimate Kerberos requests typically use AES (0x12), while Kerberoasting tools often request RC4 (0x17) because it is faster to crack
- 2
Resetting only the attacking user account without rotating the targeted service account passwords; the attacker already has the ticket hashes
- 3
Not assessing service account privilege levels; a cracked domain admin service account is a complete domain compromise
- 4
Assuming service accounts are safe because they have "strong" passwords; many organizations set service account passwords once and never rotate them
Escalation Criteria
Kerberoasting targeted service accounts with domain admin or equivalent privileges
Evidence of a targeted service account being used from an unexpected source after the attack
The Kerberoasting was performed by an account that was itself recently compromised
Practice This Investigation
SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including kerberoasting attack investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.
Frequently Asked Questions
- What is Kerberoasting and why is it dangerous?
- Kerberoasting lets any domain user request encrypted service tickets for any account with a Service Principal Name. The attacker cracks these tickets offline to get plaintext passwords. It is dangerous because: (1) it requires no special privileges, (2) it generates minimal noise, (3) the cracking happens offline where you cannot detect it, and (4) service accounts often have domain admin access.
- How quickly can Kerberos tickets be cracked?
- With modern GPUs, RC4-encrypted Kerberos tickets with weak passwords (8-12 characters) can be cracked in minutes to hours. Service accounts with complex 25+ character passwords may take years. This is why password length and complexity for service accounts is critical; and why Managed Service Accounts with automatic rotation are the best defense.
- How do I practice Kerberoasting investigations?
- SOCSimulator includes Active Directory attack scenarios featuring Kerberoasting, credential harvesting, and privilege escalation. Practice detecting these attacks in SIEM logs. Start free forever.
Related SOC Training Resources
Steal or Forge Kerberos Tickets (T1558) — Detection Training
Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable Pass the Ti…
Read more TechniqueValid Accounts (T1078) — Detection Training
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, pri…
Read more TechniqueOS Credential Dumping (T1003) — Detection Training
Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a h…
Read more GlossaryWhat is Lateral Movement? — SOC Glossary
Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…
Read more GlossaryWhat is XDR? — SOC Glossary
Extended Detection and Response (XDR) is a security platform that unifies telemetry from endpoints, networks, cloud work…
Read more GlossaryWhat is NDR? — SOC Glossary
Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…
Read more GlossaryWhat is Threat Hunting? — SOC Glossary
Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…
Read more Career PathIncident Responder Career Guide — Salary & Skills
Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…
Read more Career PathThreat Hunter Career Guide — Salary & Skills
Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…
Read more ComparisonSOCSimulator vs LetsDefend — Comparison
SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…
Read more ComparisonSOCSimulator vs TryHackMe — Comparison
SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…
Read more PlaybookPhishing Email Investigation — Investigation Playbook
When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…
Read more