• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Kerberos Wrong Password Errors

Risk Factors

Brute force attacks are low cost and relatively easy to perform. Even though this type of brute force attack is noisy, the attacker can effectively obtain credentials due to the commonality of weak and repurposed passwords.

The system might change the risk score for this detection.

Kill Chain

Exploitation

Risk Score

60

Detection diagram
Next in Exploitation: LEMURLOOT Web Shell Activity

Attack Background

Kerberos is an authentication protocol that creates tickets encrypted with account keys to verify identity and permissions. A ticket contains user, computer, or service account credentials that are encrypted with a cipher algorithm. When a user wants to access a service, they submit credentials to a Key Distribution Center (KDC) installed on a domain controller (DC), which then provides a ticket. An attacker can attempt to gain a valid Kerberos ticket with a brute force attack, which is a method for guessing a weak user or system password in the initial authentication request. Brute force attacks can occur manually through trial and error or with password cracking tools.

Mitigation Options

Limit the number of account login attempts and then block users that exceed this number

Review authentication methods and enforce policies for secure credential creation and multi-factor authentication

MITRE ATT&CK ID

What else can RevealX do for you?