From 9bfdcba4007b9d302d956bd448669852288f8e1e Mon Sep 17 00:00:00 2001 From: Nate Guagenti Date: Mon, 5 Nov 2018 21:08:19 -0500 Subject: [PATCH] Update win_alert_ad_user_backdoors.yml add another detection rule for delegation via the attack described in harmj0y's blog: https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/ --- rules/windows/builtin/win_alert_ad_user_backdoors.yml | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/rules/windows/builtin/win_alert_ad_user_backdoors.yml b/rules/windows/builtin/win_alert_ad_user_backdoors.yml index 9974f2313..6d3edb08d 100644 --- a/rules/windows/builtin/win_alert_ad_user_backdoors.yml +++ b/rules/windows/builtin/win_alert_ad_user_backdoors.yml @@ -1,9 +1,13 @@ title: Active Directory User Backdoors -description: Detects scenarios where one can control another users account without having to use their credentials via msDS-AllowedToDelegateTo and or service principal names (SPN). +description: Detects scenarios where one can control another users or computers account without having to use their credentials. references: - https://msdn.microsoft.com/en-us/library/cc220234.aspx - https://adsecurity.org/?p=3466 + - https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/ author: '@neu5ron' +tags: + - attack.t1098 + - attack.credential_access logsource: product: windows service: security @@ -21,7 +25,10 @@ detection: EventID: 5136 ObjectClass: 'user' AttributeLDAPDisplayName: 'servicePrincipalName' - condition: (selection1 and not filter1) or selection2 or selection3 + selection4: + EventID: 5136 + AttributeLDAPDisplayName: 'msDS-AllowedToActOnBehalfOfOtherIdentity' + condition: (selection1 and not filter1) or selection2 or selection3 or selection4 falsepositives: - Unknown level: high