iT邦幫忙

2024 iThome 鐵人賽

DAY 19
0
Security

資安日誌分析系列 第 19

19.Windows Log分析(Kerberos登入)

  • 分享至 

  • xImage
  •  

說明

加入Windows Active Directory 管理帳號,可以使用Kerberos方式驗證,這章看一下會產生什麼EventLog

https://en.wikipedia.org/wiki/Kerberos_(protocol)

作法

AD Server

https://ithelp.ithome.com.tw/upload/images/20241003/20077752IW44Zhys7u.png

4768 A Kerberos authentication ticket (TGT) was requested.
(1)請求TGT票證的帳戶
(2)TGT請求傳送到的 Kerberos域中的服務名稱
(3)請求的電腦的IP
(4)Encryption types 0x12:AES256-CTS-HMAC-SHA1-96,
Pre-Authentication types 2, 標準密碼身份驗證
https://ithelp.ithome.com.tw/upload/images/20241003/20077752862SgDfWkS.png

4769 A Kerberos service ticket was requested.
與4768一樣看法
https://ithelp.ithome.com.tw/upload/images/20241003/20077752ZYdkleipAL.png

4672 Special privileges assigned to new logon
指派給新登入的敏感權限清單
https://ithelp.ithome.com.tw/upload/images/20241003/20077752aY1jdYwZUF.png

4624 An account was successfully logged on
LogonType 3 從網路登入此電腦的使用者或電腦
Detailed Authentication Information 使用Kerberos方式驗證
https://ithelp.ithome.com.tw/upload/images/20241003/20077752gmEjcBz0l9.png
https://ithelp.ithome.com.tw/upload/images/20241003/20077752FPnRt9EC4u.png

4627 Group membership information
帳號加入那些群組
https://ithelp.ithome.com.tw/upload/images/20241003/20077752IOi4SmX5jt.png

Client PC

4648 A logon was attempted using explicit credentials
https://ithelp.ithome.com.tw/upload/images/20241003/20077752pgI28mNWkX.png
4624 An account was successfully logged on
LogonType 2 使用者登入這台電腦
Client這邊顯示是Negotiate
https://ithelp.ithome.com.tw/upload/images/20241003/20077752X6q1r7fSP3.png
https://ithelp.ithome.com.tw/upload/images/20241003/20077752l3HomCxQ6v.png
4627 Group membership information
https://ithelp.ithome.com.tw/upload/images/20241003/20077752r5SIAzgc6I.png
4672 Special privileges assigned to new logon
https://ithelp.ithome.com.tw/upload/images/20241003/20077752W5V6BfnE9l.png

Client PC連不到AD Server

https://ithelp.ithome.com.tw/upload/images/20241003/20077752BCtU4ke6ny.png

單純從4625事件看不出是連線問題
0XC000006D – 對於關鍵帳戶或服務帳戶,「這可能是由於錯誤的使用者名稱或驗證資訊」
https://ithelp.ithome.com.tw/upload/images/20241003/20077752wYLwrUBmdZ.png

連線行為

5156 The Windows Filtering Platform has permitted a connection
53/TCP,UDP DNS(域名服務系統)
88/TCP Kerberos - 認證代理
389/TCP,UDP 輕型目錄訪問協定 LDAP
https://ithelp.ithome.com.tw/upload/images/20241003/20077752HIjEUUBJ4D.png

Get-WinEvent -FilterXml '
<QueryList>
  <Query Id="0" Path="Security">
    <Select Path="Security">
    *[
	System[
		(EventID=5158 or EventID=5156) and 
		TimeCreated[@SystemTime&gt;="2024-10-03T11:27:17.000Z" and @SystemTime&lt;="2024-10-03T11:27:17.999Z"]
		] 
	and EventData[
		Data[@Name="DestAddress"] = "192.168.22.100"
		]
    ]
    </Select>
  </Query>
</QueryList>
' |
Select-Object Id, TimeCreated,
@{Name="DestAddress"; Expression={$_.Properties[5].Value}}, 
@{Name="DestPort"; Expression={$_.Properties[6].Value}}

REF

AD Security - [Day29] 一起來學 AD 安全吧!: 整理 Credential Request 相關手法與該監控的 Event ID
https://ithelp.ithome.com.tw/articles/10308756


上一篇
18. Windows 橫向擴散(Mimikatz)
下一篇
20. Windows 橫向擴散(Kerberos)
系列文
資安日誌分析30
圖片
  直播研討會
圖片
{{ item.channelVendor }} {{ item.webinarstarted }} |
{{ formatDate(item.duration) }}
直播中

尚未有邦友留言

立即登入留言