SigmaHQ/rules/windows/builtin/win_alert_enable_weak_encryption.yml

32 lines
1.1 KiB
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: Weak Encryption Enabled and Kerberoast
2019-11-12 22:12:27 +00:00
id: f6de9536-0441-4b3f-a646-f4e00f300ffd
description: Detects scenario where weak encryption is enabled for a user profile which could be used for hash/password cracking.
references:
- https://adsecurity.org/?p=2053
- https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/
author: '@neu5ron'
date: 2017/07/30
tags:
- attack.defense_evasion
- attack.t1089 # an old one
2020-06-16 20:46:08 +00:00
- attack.t1562.001
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
detection:
selection:
EventID: 4738
keywords:
Message|contains:
- 'DES'
- 'Preauth'
- 'Encrypted'
filters:
Message|contains:
- 'Enabled'
condition: selection and keywords and filters
falsepositives:
- Unknown
level: high