-
Notifications
You must be signed in to change notification settings - Fork 516
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[New Rule] Potential Relay Attack against a Domain Controller #3928
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
winlog.event_data.AuthenticationPackageName : "NTLM" and winlog.logon.type : "network" and | ||
|
||
/* Filter for a machine account that matches the hostname */ | ||
startswith~(host.name, substring(user.name, 0, -1)) and |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🔥 🔥
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Discussed some of this with Jon off-GH. Conclusions:
winlog.event_data.AuthenticationPackageName
probably contains NTLMv1/v2- It does not cover multi-DC environment specifically, but that's not the intent
Cool stuff!
/* Filter for a machine account that matches the hostname */ | ||
startswith~(host.name, substring(user.name, 0, -1)) and | ||
|
||
/* Verify if the Source IP belongs to the host */ | ||
not endswith(string(source.ip), string(host.ip)) and | ||
source.ip != null and source.ip != "::1" and source.ip != "127.0.0.1" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧙♂️
* [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder (cherry picked from commit dfdc214)
* [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder (cherry picked from commit dfdc214)
* [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder (cherry picked from commit dfdc214)
* [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder (cherry picked from commit dfdc214)
* [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder (cherry picked from commit dfdc214)
* [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder (cherry picked from commit dfdc214)
* [New Rule] AWS IAM CompromisedKeyQuarantine Policy Attached to User (#3910) * [New Rule] AWS IAM CompromisedKeyQuarantine Policy Attached to User * increased severity score Co-authored-by: Ruben Groenewoud <[email protected]> --------- Co-authored-by: Ruben Groenewoud <[email protected]> * [Rule Tuning] System Binary Moved or Copied (#3933) * [Rule Tuning] Sensitive Registry Hive Access via RegBack (#3947) Co-authored-by: Mika Ayenson <[email protected]> * [New Rule] Potential Relay Attack against a Domain Controller (#3928) * [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder * [Rule Tuning] AWS S3 Object Versioning Suspended (#3953) * [Tuning] Executable Bit Set for Potential Persistence Script (#3929) * [Rule Tuning] Microsoft IIS Service Account Password Dumped (#3935) * [Rule Tuning] Accepted Default Telnet Port Connection (#3954) Co-authored-by: Mika Ayenson <[email protected]> * ndjson support for action connectors * Add kibana API support for actions * Minor typo * Add actions connector support * update rule formatter * Fix typo * [New Rule] Outlook Home Page Registry Modification (#3946) * Fix typos * Update docs and generated config * Update all_versions * Fix comments --------- Co-authored-by: Isai <[email protected]> Co-authored-by: Ruben Groenewoud <[email protected]> Co-authored-by: Jonhnathan <[email protected]> Co-authored-by: Mika Ayenson <[email protected]>
…c#3928) * [New Rule] Potential Relay Attack against a Domain Controller * Update credential_access_dollar_account_relay.toml * Move to the correct folder
Issue
Part of #3544
Summary
Identifies potential relay attacks against a domain controller (DC) by identifying authentication events using the domain controller computer account coming from other hosts to the DC that owns the account. Attackers may relay the DC hash after capturing it using forced authentication.
Data
Events/Sample Data