title: Weak Encryption Enabled and Kerberoast id: f6de9536-0441-4b3f-a646-f4e00f300ffd description: Detects scenario where weak encryption is enabled for a user profile which could be used for hash/password cracking. references: - https://adsecurity.org/?p=2053 - https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/ author: '@neu5ron' date: 2017/07/30 tags: - attack.defense_evasion - attack.t1089 # an old one - attack.t1562.001 logsource: product: windows service: security definition: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management' detection: selection: EventID: 4738 keywords: Message|contains: - 'DES' - 'Preauth' - 'Encrypted' filters: Message|contains: - 'Enabled' condition: selection and keywords and filters falsepositives: - Unknown level: high