In the era of cyberattacks, nothing is safe, including the authentication protocols like Kerberos. Hackers can bypass and lay their hands on the application or data it’s guarding. In this guide, let’s comprehend what the Kerberoast attack means and what its approach is.
Kerberos is a Windows-compatible protocol authorizing network-based devices/applications/users. With its service, it’s possible to govern network resource access and guarantee that only authorized professionals are acquiring access.
Kerberoasting Is where cyberpunks plan to use specialized tools to break into the encrypted Kerberos tickets so that they can learn what’s hidden behind the protection.
Once encryption is interpreted, cyberpunks manage to gain access to shielded network resources or data they are saving.
For beginners, service accounts are specific accounts useful for isolating domain accounts from common ones with the intention of keeping the former type of account restricted. Most security-concerned businesses use them to make sure important data is not frequently accessed, resulting in high vulnerability probabilities.
The access rights to these accounts are mostly granted to high-privileged personnel, and these accounts also have upgraded permissions. Kerberos authentication is mostly applied to such accounts. Hackers, willing to gain root-level access to AD domains, have to gain full control over verified managed accounts.
This is a post-exploitation attack method often involving brute force techniques. Once the cyberpunk manages to get hold of the plaintext password, s/he is able to access actual accounts.
It uses tickets that promote devices/users authentication without traversing plaintext passwords. The tickets are additionally exhaustively encrypted via a secret key whose access rights are retained by the server managing access denial/approval for concerned users. Anyone willing to access protocol-protected network assets has to have a hold over the secret key, to begin with.
The reason why these attacks continue to rise and provoke severe damage is that the majority of security approaches have no provision for monitoring verified activities.
Companies often think that as they have applied authentication and promoted robust password usage, service accounts are protected. Hence, there is hardly any cybersecurity tactic applied beyond authentication, and detecting Kerberoasting becomes tough.
As the attack succeeds and the ticket key is retrieved seamlessly, there are no more hurdles between hackers and network-side resources. They will be able to gain lateral entry to the secret keys and steal mission-critical information.
Next behind the increased number of Kerberos attacks is the wider-level usage of Windows networks. Windows networks are most commonly seen as hackers know that they have a wide scope with this attack.
Lastly, as the protocol is mainly used in enterprise-level networks, threat actors know that they will be able to access heavy-weight information if the access is granted.
A highly strategic approach works behind the Kerberaosting that involves the below-mentioned steps.
The first stage of the attack is to bypass the authentication imposed by the attack. Hackers start obtaining crucial permissions so that they can have access to tickets. To make this happen, they generally exploit the access and login details of a verified user.
Once this is done, threat actors will have a smooth entry to the network resources without letting anyone, including the actual account owner, perform permitted activities. This is one of the most common methods that allow hackers to steal the credentials of concerned accounts.
Another crucial workflow of the attack is obtaining service tickets in bulk and using them to decode the respective passwords. A pre-verified Kerberos ticket-granting ticket or TGT is abused in the process.
At times, hackers also use network traffic sniffing techniques to access TGT.
Often, hackers directly acquire the ticket by exploiting the access rights or log in details of verified users. Upon obtaining these tickets, they now move to the next stage of a Kerberoasting attack which is decoding the password. For this, they require a specialized tool to eliminate encryption.
As passwords are cracked, bad actors start penetrating deeper into the targeted resource. Depending upon their aim, they can steal mission-critical data, change crucial settings, or even install malware to worsen the attack. It's commonly seen in this attack that cyberpunks exploit the SPNs with the help of AD PowerShell. SQL remains their priority.
As mentioned above, Kerberoasting attacks are prevailing and are commonly seen. Below mentioned are the two most famous examples of this attack.
Solorigate backdoor attack is a famous Kerberoasting attack wherein threat actors were successful to access TGS tickets for the AD SPNs. Multiple businesses were affected as a result of this attack. Kerberoasting was one of many techniques that threat actors used to shape the attack.
During Wocao operations, bad actors exploited the Invoke-Kerberoast module of PowerSploit and were able to access the encrypted tickets and passwords of linked Windows Service accounts while they were offline. Hackers are then able to access the managed account.
Conducting a successful Kerberoasting attack demands more than skills and expertise. Hackers need advanced tools, and Mimikatz is one of them. Designed to pull mission-critical data for a given device, it eases down password extraction.
Using it, threat actors obtain service tickets and decipher the associated passwords. It automates multiple workflows and reduces the efforts that one might have to invest while extracting authentication tickets. However, it does not always help attackers. Enterprises also use it to check the authenticity of existing security systems by conducting controlled attacks.
Considering the fact that this attack takes place after applying a security practice, detecting it seems a little difficult. However, this should be an excuse as this is a serious threat to network resources and has the potential to cause serious damage.
In this part of the post, we’re going to learn about recommended Kerberoasting detection techniques and how their impact can be fully or partially controlled.
One of the most novel detection techniques, identity security aims to recognize the early-stage identity infrastructure risks. It mainly works to control the possibilities of a Kerberoasting attack on Active Directory.
An inventive Identity Security tool is of great help in spotting the identity settings that make an Active Directory vulnerable. When combined with the practice of using robust passwords, this technique makes service ticket obtaining tasks a little more tedious.
Users are also recommended to implement other standardized security measures like using network monitoring and MFA to enhance the viability of identity security settings. With MFA, more than one login process is used to protect the account. Hackers have to bypass multiple security layers to reach the main account, while network monitoring ensures that no risky activity goes undetected for long.
Speaking of effective detection of Kerberoasting attacks, using threat hunting works great as this approach helps security professionals to detect the presence of account security compromising. With threat hunting, one can sense the account compromise and implement strategies to prevent it.
It’s an efficacious way to recognize any suspicious activity in and around the Kerberos protocol. For instance, it can mark access requests per service ticket or password-cracking attempts. When implemented correctly, this can detect a Kerberoasting attack in its initiation stage and prevent it from blooming.
Endpoint protection is an extensive security approach that involves multiple device protection, encryption, port protection, firewall, and many other tactics that are used for protecting the endpoints. Here are a few recommendations in this regard.
Deception is an established cyber defense approach wherein a copy of real assets is used to decoy or divert the attention of cybercriminals. These copies are used as bait so that hackers start working on them and don’t aim at the worthy resources.
One can use this practice to detect and prevent Kerberoasting attacks. For this, they are recommended to create fake user accounts with minor loopholes that hackers consider as a vulnerability.
These accounts are then kept under continuous monitoring so that non-permitted activities, involving service tickets, are spotted early. However, it is not recommended to solely back upon deception technology for effective detection as it may not work in all cases. Hence, combining it with other advanced technologies is highly recommended.
With the implementation of the right kind of security policies, the possibility of a Kerberoast attack can be contained to a great extent. Windows offer specific security policies that one can access from Computer >Configuration>Windows Settings>Security> Settings>Account Policies>Kerberos Policy. There is a certain setting recommendation for default Kerberoast attack protection.
The expert-recommended limit here is 10 hours. This ensures that users are not logon for long which further increases the attack possibilities.
Service accounts, as they are used to access resources of high importance, need best-in-class protection and user access practices. Any leniency on this front can cause serious security risks, and the Kerberoasting attack is one of them.
Practices like identity security, MFA, endpoint platforms, and many more that we discussed in the post can help enterprises to prevent login credential stealing and exploitation of service tickets. Combine all of them or pick that sounds best in your case and start enjoying advanced Kerberoasting protection.
Kerberoasting - OWASP pdf
Subscribe for the latest news