🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • Introduction
  • Attack Description
  • Significance for Security Operations Centers (SOCs)
  • KQL Detection Queries
  • Splunk Detection Query
  • Reference
Edit on GitHub
  1. Detection Engineering
  2. AD Attack Detections & Mitigations

Golden Ticket

Introduction

The Golden Ticket is a highly advanced and dangerous attack technique leveraged by threat actors to gain persistent and virtually unlimited access to an organisation's network. It targets Active Directory (AD), which is the cornerstone of identity and access management in most enterprise environments. The attack exploits the core functionality of Kerberos, a network authentication protocol, allowing attackers to impersonate any user or service in the domain.

Named after the concept of a "golden ticket" that provides unlimited access, this technique represents a worst-case scenario for security professionals, as it bypasses standard authentication mechanisms and is exceedingly difficult to detect.


Attack Description

In a Golden Ticket attack, the adversary generates a forged Kerberos ticket-granting ticket (TGT) using the Kerberos protocol. This allows them to authenticate as any user, including privileged accounts like Domain Admins, for an indefinite period. The attack hinges on compromising the KRBTGT account, a highly sensitive account used to encrypt and sign all TGTs in the domain.

The key elements of the attack are:

  1. Prerequisites:

    • The attacker must have administrative access to a domain controller or access to the domain's KRBTGT account hash.

    • This is typically achieved through techniques like credential theft, Pass-the-Hash, or exploitation of Active Directory vulnerabilities.

  2. Execution:

    • Once the KRBTGT hash is obtained, the attacker uses tools like Mimikatz to forge a valid TGT.

    • The forged ticket is then injected into the current session, allowing the attacker to impersonate any user or service on the domain.

  3. Capabilities:

    • Persistent access: The forged TGT can be configured to remain valid indefinitely, even after password resets.

    • Privilege escalation: The attacker can impersonate high-privilege accounts, such as Domain Admins, to perform sensitive operations.

    • Stealth: The attack often bypasses traditional detection methods, as the TGT appears legitimate to the domain.

  4. Detection and Mitigation Challenges:

    • Since the Golden Ticket relies on the compromised KRBTGT hash, typical password changes do not mitigate the risk.

    • Detecting Golden Tickets is challenging because they leverage the same cryptographic mechanisms used by legitimate tickets.

  5. Indicators of Compromise (IoCs):

    • Unusual account activity, such as privilege escalation without prior authorisation.

    • Authentication events where the TGT does not match normal ticket issuance patterns.

    • Abnormal logins from service accounts or sensitive administrative accounts.


Significance for Security Operations Centers (SOCs)

The Golden Ticket attack is particularly devastating in the context of enterprise security because of its capability to completely compromise Active Directory environments. SOC analysts and security teams must prioritise proactive threat hunting and defence strategies to mitigate its impact, including:

  • Regular KRBTGT password resets (twice, in a staggered manner, to invalidate all existing tickets).

  • Monitoring for suspicious activities in the Windows Security Event Logs, such as Event ID 4769 (Kerberos Service Ticket Request).

  • Implementing tools and techniques for Active Directory auditing and Kerberos traffic inspection.

  • Deploying Endpoint Detection and Response (EDR) and threat-hunting solutions like Velociraptor or Defender XDR to identify anomalous patterns.

By understanding the mechanics and implications of the Golden Ticket attack, SOC teams can better defend against this high-impact threat.

KQL Detection Queries

To detect a Golden Ticket attack using KQL (Kusto Query Language) in tools like Microsoft Sentinel or Defender for Endpoint, you can analyse Windows Security Event Logs, mainly focusing on Kerberos ticketing events.

KQL Query: Detecting Golden Ticket Attack

SecurityEvent
| where EventID in (4768, 4769, 4770) // Kerberos authentication events
| extend TicketOptions = extractjson("$.TicketOptions", AdditionalInfo, typeof(string))
| where EventID == 4768 and TicketOptions contains "0x40810010" // Unusual TGT flags
    or EventID == 4769 and ServiceName == "krbtgt" and (TimeToLive > 10d or TimeToLive == 0) // Abnormally long ticket lifetime
    or EventID == 4770 and Status in ("0xC00000BB", "0xC000019B") // Unusual status codes for Kerberos requests
| extend AnomalousAttributes = iff(EventID == 4768, "Suspicious TGT request", 
                            iff(EventID == 4769, "Abnormal Service Ticket Request", 
                            "TGT Renewal Anomaly"))
| summarize Count = count() by Computer, AccountName, TargetDomainName, EventID, AnomalousAttributes, bin(TimeGenerated, 1h)
| order by Count desc

Explanation of Query Logic

  1. Filter Events:

    • Focus on Kerberos-related event IDs:

      • 4768: TGT request.

      • 4769: Service ticket request.

      • 4770: TGT renewal.

  2. Unusual Flags in TGT:

    • A Golden Ticket often includes uncommon ticket options (0x40810010) that indicate high privilege and a manually crafted ticket.

  3. Abnormally Long Ticket Lifetimes:

    • Legitimate Kerberos tickets have limited lifetimes (typically 10 hours). Golden Tickets often have unusually long or unlimited lifetimes (TimeToLive == 0).

  4. Status Code Anomalies:

    • Certain status codes like 0xC00000BB (invalid ticket) or 0xC000019B (service request anomaly) may indicate suspicious activity.

  5. Anomalous Attributes:

    • Events are labeled with attributes that point to their anomalous nature for easier SOC investigation.

  6. Summarisation:

    • Events are grouped and counted by key dimensions, such as Computer, AccountName, and EventID, allowing SOC analysts to spot trends or outliers.


Next Steps for Investigation

  1. Validate with Additional Context:

    • Cross-reference detected anomalies with other logs, such as process creation or lateral movement events.

  2. Examine KRBTGT Activity:

    • Look for unauthorized access to the KRBTGT account and verify its password change history.

  3. Forensic Actions:

    • Isolate affected systems and reset KRBTGT passwords (twice) to invalidate forged tickets.

Query to detect potential Golden Ticket attacks in your environment:

SecurityEvent
| where EventID == 4769
| where TargetUserName endswith "$"
| where ServiceName == "krbtgt"
| where TicketOptions has_any ("renewable", "forwardable")
| project TimeGenerated, Computer, TargetUserName, ServiceName, TicketOptions, IpAddress, AccountName

Query looks for Kerberos Service Ticket Requests (Event ID 4769) where the target username ends with a dollar sign ($), indicating a service account, and the service name is krbtgt. It also checks for ticket options that are renewable or forwardable, which are common characteristics of Golden Ticket attacks.

Advanced KQL Query: Detecting Golden Ticket Activity

let KerberosAnomalies = SecurityEvent
| where EventID in (4768, 4769, 4770) // Focus on Kerberos-related events
| extend TicketOptions = extractjson("$.TicketOptions", AdditionalInfo, typeof(string))
| extend EncryptedData = extractjson("$.EncryptedData", AdditionalInfo, typeof(string))
| extend TimeToLive = extractjson("$.TimeToLive", AdditionalInfo, typeof(int))
| extend TargetServiceName = iif(EventID == 4769, ServiceName, "N/A")
| extend AnomalousBehavior = case(
    EventID == 4768 and TicketOptions contains "0x40810010", "Suspicious TGT Options",
    EventID == 4769 and TargetServiceName == "krbtgt" and (TimeToLive > 10d or TimeToLive == 0), "Abnormal Ticket Lifetime",
    EventID == 4770 and Status in ("0xC00000BB", "0xC000019B"), "TGT Renewal Anomaly",
    EventID == 4768 and AccountName contains "$", "Service Account TGT Request",
    EventID == 4769 and EncryptedData contains "AES256_CTS_HMAC_SHA1_96", "Unusual Encryption Method",
    "Normal"
)
| where AnomalousBehavior != "Normal";
let SuspiciousActivity = SecurityEvent
| where EventID in (4624, 4672, 4688) // Privileged logons and process creation events
| extend LogonType = extractjson("$.LogonType", AdditionalInfo, typeof(int))
| extend PrivilegeElevated = (EventID == 4672)
| extend ParentCommandLine = extractjson("$.ParentCommandLine", AdditionalInfo, typeof(string))
| where PrivilegeElevated == true or LogonType in (2, 3) // Interactive or Network logons
| extend AnomalousBehavior = case(
    EventID == 4624 and AccountName contains "$", "Unusual Service Account Logon",
    EventID == 4688 and ProcessName endswith "mimikatz.exe", "Suspicious Process Execution",
    "Normal"
)
| where AnomalousBehavior != "Normal";
KerberosAnomalies
| union SuspiciousActivity
| summarize Count = count(), FirstSeen = min(TimeGenerated), LastSeen = max(TimeGenerated) by Computer, AccountName, TargetDomainName, EventID, AnomalousBehavior
| extend TimeWindow = LastSeen - FirstSeen
| order by Count desc

Explanation of Advanced Features

  1. Enhanced Detection Criteria:

    • Adds additional layers to identify Golden Ticket patterns:

      • Suspicious encryption methods (AES256_CTS_HMAC_SHA1_96), often used in manually forged tickets.

      • Service accounts ($) making unusual TGT requests.

      • Elevated privilege actions or anomalous logon behaviours.

  2. Behavioural Context:

    • Incorporates related events like privileged logons (EventID 4672) and process executions (EventID 4688) to correlate potential misuse of privileges with Kerberos anomalies.

  3. Dynamic Labeling:

    • Events are dynamically tagged with AnomalousBehavior descriptions to help analysts understand the context.

  4. Summarisation and Prioritisation:

    • Groups suspicious activities by computer, account, and domain, along with timestamps (FirstSeen, LastSeen) for a time-based view of the attack.

  5. Combining Activity:

    • Merges results from Kerberos-specific anomalies with broader suspicious activities (e.g., unusual process executions) for a holistic threat view.


Advanced Use Cases

  • Golden Ticket Behaviour Analysis: Detect extended persistence or lateral movement enabled by forged TGTs.

  • Prioritized Alerts: Focus on accounts or systems with multiple anomalous activities.

  • Forensic Investigation: Time window (TimeWindow) and event summaries aid in tracing attack paths.


Recommendations for Customization

  • Adjust the thresholds for TimeToLive and logon types to align with your organisation’s specific Kerberos and logon policies.

  • Incorporate integration with Defender XDR or Active Directory audit logs for deeper analysis of account behaviours.

  • Add threat intelligence feeds to cross-reference accounts or IPs involved in the anomalies.

Query to detect potential Golden Ticket attacks, incorporating additional details and filtering for suspicious activities:

SecurityEvent
| where EventID in (4768, 4769, 4770, 4771)
| where TargetUserName endswith "$"
| where ServiceName == "krbtgt"
| where TicketOptions has_any ("renewable", "forwardable")
| extend AccountDomain = split(TargetUserName, "@")[1]
| join kind=inner (
    SecurityEvent
    | where EventID == 4624
    | where LogonType == 3
    | where AuthenticationPackageName == "Kerberos"
    | project LogonTime = TimeGenerated, LogonComputer = Computer, LogonIpAddress = IpAddress, LogonAccountName = AccountName
) on $left.IpAddress == $right.LogonIpAddress
| project TimeGenerated, Computer, TargetUserName, ServiceName, TicketOptions, IpAddress, AccountName, LogonTime, LogonComputer, LogonAccountName, AccountDomain
| order by TimeGenerated desc

Query does the following:

  1. Looks for Kerberos-related events (Event IDs 4768, 4769, 4770, 4771).

  2. Filters for service accounts (TargetUserName ending with $) and the krbtgt service.

  3. Checks for ticket options that are renewable or forwardable.

  4. Extracts the account domain from the TargetUserName.

  5. Joins with logon events (Event ID 4624) to correlate Kerberos authentication with logon activities.

  6. Projects relevant fields and orders the results by the time generated.

This query should help you detect more sophisticated Golden Ticket attacks by correlating Kerberos ticket requests with actual logon events.

Splunk Detection Query

The following are Splunk queries to detect potential Golden Ticket attacks by analysing Windows Security Event Logs, focusing on suspicious Kerberos activity:

Splunk Query: Detecting Golden Ticket Activity

index=wineventlog (EventCode=4768 OR EventCode=4769 OR EventCode=4770) 
| eval AnomalousBehavior = case(
    EventCode==4768 AND like(Ticket_Options, "%0x40810010%"), "Suspicious TGT Options",
    EventCode==4769 AND like(Service_Name, "%krbtgt%") AND (Ticket_Lifetime > 864000 OR Ticket_Lifetime=0), "Abnormally Long Ticket Lifetime",
    EventCode==4770 AND (Status="0xC00000BB" OR Status="0xC000019B"), "TGT Renewal Failure",
    EventCode==4768 AND like(Account_Name, "%$"), "Service Account TGT Request",
    EventCode==4769 AND like(Encryption_Type, "%AES256_CTS_HMAC_SHA1_96%"), "Unusual Encryption Method",
    1=1, "Normal"
)
| search AnomalousBehavior!="Normal"
| stats count, earliest(_time) AS FirstSeen, latest(_time) AS LastSeen BY host, Account_Name, Service_Name, AnomalousBehavior
| eval TimeWindow = tostring(LastSeen - FirstSeen, "duration")
| rename host AS Computer, Account_Name AS AccountName, Service_Name AS ServiceName
| table Computer, AccountName, ServiceName, AnomalousBehavior, count, FirstSeen, LastSeen, TimeWindow
| sort - count

Explanation of Query Components

  1. Events of Interest:

    • Event ID 4768: TGT request (Ticket Granting Ticket).

    • Event ID 4769: Service ticket request.

    • Event ID 4770: TGT renewal.

  2. Anomalous Conditions:

    • Suspicious TGT Options: Detects rare Kerberos flags (e.g., 0x40810010) used in manually crafted TGTs.

    • Long Ticket Lifetimes: Golden Tickets often have lifetimes exceeding normal thresholds (e.g., 10 days) or are set to never expire (Lifetime = 0).

    • Renewal Failures: Certain Kerberos renewal errors (0xC00000BB, 0xC000019B) may indicate tampered tickets.

    • Unusual Encryption: Looks for encryption types associated with manual ticket crafting (AES256_CTS_HMAC_SHA1_96).

    • Service Account Activity: Service accounts ($) making unexpected TGT requests.

  3. Behaviour Labeling:

    • Assigns a descriptive label (AnomalousBehavior) to suspicious activities for easier investigation.

  4. Summarization:

    • Groups anomalies by key attributes such as host, Account_Name, and Service_Name.

    • Calculates timestamps (FirstSeen, LastSeen) to establish a timeframe for the activity.

    • Adds a TimeWindow field to show the duration between the first and last detected anomalies.

  5. Result Presentation:

    • Displays key fields (Computer, AccountName, ServiceName, AnomalousBehavior) for SOC investigation.

    • Orders results by the number of anomalies (count) to prioritise investigation.


Recommendations for Optimisation

  1. Log Field Extraction:

    • Ensure fields like Ticket_Options, Service_Name, Encryption_Type, and Ticket_Lifetime are extracted from your Windows Event Logs.

  2. Baseline Normal Behavior:

    • Identify normal patterns for Kerberos activity in your environment and adjust thresholds (e.g., ticket lifetimes) accordingly.

  3. Correlate with Additional Logs:

    • Combine results with process execution (EventCode 4688) or privilege escalation logs (EventCode 4672) for broader context.

  4. Alerting:

    • Set up alerts in Splunk for high-priority anomalies like Suspicious TGT Options or Abnormally Long Ticket Lifetimes.

Splunk query to detect potential Golden Ticket attacks in your environment:

index=windows sourcetype=WinEventLog:Security
(EventCode=4768 OR EventCode=4769 OR EventCode=4770 OR EventCode=4771)
TargetUserName="*$"
ServiceName="krbtgt"
TicketOptions="*renewable*" OR TicketOptions="*forwardable*"
| stats count by _time, ComputerName, TargetUserName, ServiceName, TicketOptions, IpAddress, AccountName
| sort -_time

Query does the following:

  1. Searches for Kerberos-related events (Event Codes 4768, 4769, 4770, 4771).

  2. Filters for service accounts (TargetUserName ending with $) and the krbtgt service.

  3. Checks for ticket options that are renewable or forwardable.

  4. Aggregates the results by time, computer name, target username, service name, ticket options, IP address, and account name.

  5. Sorts the results by time in descending order.

This should help you detect potential Golden Ticket attacks by identifying suspicious Kerberos ticket requests.

Reference

PreviousDumping ntds.ditNextSilver Ticket

Last updated 4 months ago

Microsoft Identity and Access documentation
Detecting and mitigating Active Directory compromises
Best Practices for Securing Active Directory
Securing Domain Controllers Against Attack
Top 25 Active Directory Security Best Practices
Active Directory Security Best Practices