技能 编程开发 检测 DCSync 攻击

检测 DCSync 攻击

v20260317
hunting-for-dcsync-attacks
通过分析 Windows 事件 ID 4662,定位非域控制器发起的 DS-Replication-Get-Changes 请求,结合合法 DC 和工具确认后执行禁用账户、重置 krbtgt 等响应,快速捕捉 DCSync 威胁。
获取技能
374 次下载
概览

Hunting for DCSync Attacks

When to Use

  • When hunting for DCSync credential theft (MITRE ATT&CK T1003.006)
  • After detecting Mimikatz or similar tools in the environment
  • During incident response involving Active Directory compromise
  • When monitoring for unauthorized domain replication requests
  • During purple team exercises testing AD attack detection

Prerequisites

  • Windows Security Event Log forwarding enabled (Event ID 4662)
  • Audit Directory Service Access enabled via Group Policy
  • Domain Computers SACL configured on Domain Object for machine account detection
  • SIEM with Windows event data ingested (Splunk, Elastic, Sentinel)
  • Knowledge of legitimate domain controller accounts and replication partners

Workflow

  1. Enable Auditing: Ensure Audit Directory Service Access is enabled on domain controllers.
  2. Collect Events: Gather Windows Event ID 4662 with AccessMask 0x100 (Control Access).
  3. Filter Replication GUIDs: Search for DS-Replication-Get-Changes and DS-Replication-Get-Changes-All.
  4. Identify Non-DC Sources: Flag events where SubjectUserName is not a domain controller machine account.
  5. Correlate with Network: Cross-reference source IPs against known DC addresses.
  6. Validate Findings: Exclude legitimate replication tools (Azure AD Connect, SCCM).
  7. Respond: Disable compromised accounts, reset krbtgt, investigate lateral movement.

Key Concepts

Concept Description
DCSync Technique abusing AD replication protocol to extract password hashes
Event ID 4662 Directory Service Access audit event
DS-Replication-Get-Changes GUID 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2
DS-Replication-Get-Changes-All GUID 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2
AccessMask 0x100 Control Access right indicating extended rights verification
T1003.006 OS Credential Dumping: DCSync

Tools & Systems

Tool Purpose
Windows Event Viewer Direct event log analysis
Splunk SIEM correlation of Event 4662
Elastic Security Detection rules for DCSync patterns
Mimikatz lsadump::dcsync Attack tool used to perform DCSync
Impacket secretsdump.py Python-based DCSync implementation
BloodHound Identify accounts with replication rights

Output Format

Hunt ID: TH-DCSYNC-[DATE]-[SEQ]
Technique: T1003.006
Domain Controller: [DC hostname]
Subject Account: [Account performing replication]
Source IP: [Non-DC IP address]
GUID Accessed: [Replication GUID]
Risk Level: [Critical/High/Medium/Low]
Recommended Action: [Disable account, reset krbtgt, investigate]
信息
Category 编程开发
Name hunting-for-dcsync-attacks
版本 v20260317
大小 10.55KB
更新时间 2026-03-18
语言