RP0004: Pass the certificate
Summary
ID | RP0004 |
---|---|
Brief Description | Response playbook for pass the certificate attack |
Author | @ERMACK_COMMUNITY |
Creation Date | 2023/05/11 |
Modification Date | 2023/05/27 |
Tags |
|
Usecases |
Description
Attackers can use pass the certificate attack with certificate which they created themselves (Golden Certificate or Shadow Credentials) or with a stolen certificate. Certificate created by attackers cannot be revoked
Workflow
- On identification stage need find domain account which was attacked and host from which attack occur. This information can be taken from Windows Security event log 4768 - A Kerberos authentication ticket (TGT) was requested
- On containment stage, when you found an account that was attacked lock this account and go to compromised active directory account response playbook
- On containment stage, when you found the host from which attack occur go to windows host compromised response playbook
- On eradication stage, if certificate has been stolen (this means certificate authority known this certificate) revoke that certificate
- On recovery stage, unlock previously locked account and reissue revoked previously certificate
- Save all timestamps of implemented actions in Incident Report draft on the fly, it will save a lot of time
Response discovery mapping
ARTIFACT | RESPONSE ACTION | RESPONSE ACTION OBSERVABLES |
---|---|---|
Domain account | Find account to which TGT was requested. The name of this account will be in the account information section of the event log | Attacked domain account |
Log | Find Windows Security event log 4768 - A Kerberos authentication ticket (TGT) was requested | Event log with info about requesting user, requesting IP Address and certificate |
Host | Find host from which TGT was requested. The IP Address of this host will be in the network information section of the event log | Host from which the attack is occur |
IP Address | Find IP Address from which TGT was requested. The IP Address will be in the network information section of the event log | IP Address from which the attack is occur |
Playbook Actions
Preparation
Operational Preparations
Get Ability To Lock User Account
Preparing to block user account via Powershell
Identification
Identify affected systems and users
Containment
Compromised active directory account
Windows host compromise
Eradication
Recovery
Lessons Learned
Develop Incident Report
Conduct Lessons Learned Exercise