技能 编程开发 检测金票攻击

检测金票攻击

v20260317
detecting-golden-ticket-attacks
分析 Windows 安全 EVTX 日志,通过关联 4768、4624、4672 事件,识别超长 TGT、无成员变更的权限提升、域 SID 异常等金票迹象,并按时间线生成检测报告。
获取技能
335 次下载
概览

Instructions

  1. Install dependencies: pip install python-evtx lxml
  2. Collect Windows Security EVTX logs from domain controllers.
  3. Parse Event IDs:
    • 4768: Kerberos TGT requests (authentication service requests)
    • 4624: Logon events (look for LogonType 3 with NTLM or Kerberos)
    • 4672: Special privileges assigned (admin logon indicators)
  4. Detect golden ticket indicators:
    • TGT with lifetime >10 hours (default max is 10h)
    • Event 4672 for accounts not in Domain Admins
    • Logon events with no corresponding 4768 TGT request
    • Domain SID inconsistencies in ticket data
  5. Generate detection report with timeline reconstruction.
python scripts/agent.py --evtx-file /path/to/Security.evtx --output golden_ticket_report.json

Examples

Detect Anomalous Privilege Assignment

Event 4672 for a standard user account receiving SeDebugPrivilege, SeTcbPrivilege, or SeBackupPrivilege indicates potential golden ticket usage.

TGT Without Corresponding AS-REQ

A logon event (4624) with Kerberos authentication but no matching 4768 (TGT request) on the DC suggests a forged TGT.

信息
Category 编程开发
Name detecting-golden-ticket-attacks
版本 v20260317
大小 8.42KB
更新时间 2026-03-18
语言