Analytics Story: Kerberos Coercion with DNS

Description

Detects Kerberos coercion attacks via DNS manipulation. Identifies DNS record modifications where the Distinguished Name contains a base64-encoded CREDENTIAL_TARGET_INFORMATION structure.

Why it matters

CVE-2025-33073 is a critical vulnerability related to Kerberos Reflection attacks impacting Active Directory environments. The journey began with a configuration involving a Domain Controller set up in a lab environment where offensive tradecraft was being developed. The attacker utilized a DNS record manipulation technique that involved appending a specific "magic string" to the hostname, which ultimately enabled successful coercive authentication, leading to remote code execution as SYSTEM.

Detections

Name ▲▼ Technique ▲▼ Type ▲▼
Windows Credential Target Information Structure in Commandline Name Resolution Poisoning and SMB Relay, Forced Authentication, DNS TTP
Windows Kerberos Coercion via DNS DNS, Name Resolution Poisoning and SMB Relay, Forced Authentication TTP
Windows Short Lived DNS Record DNS, Name Resolution Poisoning and SMB Relay, Forced Authentication TTP
DNS Kerberos Coercion Name Resolution Poisoning and SMB Relay, Forced Authentication, DNS TTP

Data Sources

Name ▲▼ Platform ▲▼ Sourcetype ▲▼ Source ▲▼
Suricata Other suricata not_applicable
Sysmon EventID 1 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Sysmon EventID 22 Windows icon Windows XmlWinEventLog XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
Windows Event Log Security 4662 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Windows Event Log Security 5136 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security
Windows Event Log Security 5137 Windows icon Windows XmlWinEventLog XmlWinEventLog:Security

References


Source: GitHub | Version: 1