Credential Access

Kerberoasting: SPN Sweep

Kerberoasting: SPN Sweep

Detection overview

Kerberoasting: SPN Sweep is a detection focused on identifying attempts to enumerate Service Principal Names (SPNs) within an Active Directory environment. Attackers use SPN sweeps to gather information about service accounts that can be targeted for Kerberoasting attacks. By requesting SPNs, attackers can obtain service account ticket-granting service (TGS) tickets, which can be brute-forced offline to reveal plaintext passwords.

Triggers

  • A host is observed requesting service tickets for a high volume of SPNs.

Possible Root Causes

  • Malicious Detection: An attacker is performing recon in a domain to find favorable targets for offline password cracking.
  • Benign Detection: Enterprise vulnerability scanners may also submit requests for a large volume of SPNs.

Business Impact

  • Specific Risk: Kerberoasting may result in the discovery of a privileged account’s password.
  • Impact: Depending on the level of privilege a cracked account has (e.g. service account with domain admin), this could lead directly to a full domain compromise.

Steps to Verify

  • Investigate the host making requests for high volume of SPNs, this behavior is not typical for general users and should only be conducted by authorized hosts.
Kerberoasting: SPN Sweep

Possible root causes

Malicious Detection

  • An attacker is performing reconnaissance to identify service accounts for Kerberoasting attacks.
  • Use of automated tools or scripts to enumerate SPNs.

Benign Detection

  • Legitimate security assessments or penetration tests.
  • Administrative tasks involving bulk service account management.
Kerberoasting: SPN Sweep

Example scenarios

Scenario 1

An attacker uses a compromised user account to perform an SPN sweep. The attacker retrieves a list of service accounts and their associated SPNs. Using a tool like Rubeus, the attacker requests TGS tickets for these accounts and then proceeds to brute-force the tickets offline to obtain the plaintext passwords.

Scenario 2

During a penetration test, the security team runs a script to enumerate SPNs to identify potential targets for Kerberoasting. The detection is triggered, and the security team verifies the activity as part of the assessment.

Kerberoasting: SPN Sweep

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Credential Compromise

Attackers can obtain plaintext passwords of service accounts, which may have elevated privileges.

Lateral Movement

Compromised credentials can be used to move laterally within the network, escalating privileges.

Data Breach

Access to sensitive data and resources, leading to potential data exfiltration.

Kerberoasting: SPN Sweep

Steps to investigate

Kerberoasting: SPN Sweep

MITRE ATT&CK techniques covered

Kerberoasting: SPN Sweep

Related detections

FAQs

What is Kerberoasting?

How can I detect an SPN sweep in my environment?

What are the common signs of an SPN sweep?

Why is an SPN sweep a significant threat?

Can legitimate activities trigger an SPN sweep detection?

What steps should I take if I detect an SPN sweep?

How does Vectra AI detect SPN sweeps?

What tools can help verify the presence of Kerberoasting attempts?

What is the business impact of an SPN sweep?

How can I prevent SPN sweeps?