Analytics Story: Kerberos Coercion with DNS

Description

Detects Kerberos coercion attacks via DNS manipulation. Identifies DNS record modifications where the Distinguished Name contains a base64-encoded CREDENTIAL_TARGET_INFORMATION structure.

Why it matters

CVE-2025-33073 is a critical vulnerability related to Kerberos Reflection attacks impacting Active Directory environments. The journey began with a configuration involving a Domain Controller set up in a lab environment where offensive tradecraft was being developed. The attacker utilized a DNS record manipulation technique that involved appending a specific "magic string" to the hostname, which ultimately enabled successful coercive authentication, leading to remote code execution as SYSTEM.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Windows Credential Target Information Structure in Commandline LLMNR/NBT-NS Poisoning and SMB Relay, Forced Authentication, DNS TTP
Windows Kerberos Coercion via DNS DNS, LLMNR/NBT-NS Poisoning and SMB Relay, Forced Authentication TTP
Windows Short Lived DNS Record DNS, LLMNR/NBT-NS Poisoning and SMB Relay, Forced Authentication TTP
DNS Kerberos Coercion LLMNR/NBT-NS Poisoning and SMB Relay, Forced Authentication, DNS TTP

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
Suricata Other suricata suricata
Sysmon EventID 1 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 22 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows Event Log Security 4662 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Windows Event Log Security 5136 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Windows Event Log Security 5137 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security

References


Source: GitHub | Version: 1