Browse Skills
Detecting Golden Ticket Attacks
v1.0.0>-
Detecting Golden Ticket Attacks In Kerberos Logs
v1.0.0Detect Golden Ticket attacks in Active Directory by analyzing Kerberos TGT anomalies including mismatched encryption types, impossible ticket lifetimes, non-existent accounts, and forged PAC signatures in domain controller event logs.
Detecting Golden Ticket Forgery
v1.0.0Detect Kerberos Golden Ticket forgery by analyzing Windows Event ID 4769 for RC4 encryption downgrades (0x17), abnormal ticket lifetimes, and krbtgt account anomalies in Splunk and Elastic SIEM
Detecting Insider Data Exfiltration Via Dlp
v1.0.0>
Detecting Insider Threat Behaviors
v1.0.0Detect insider threat behavioral indicators including unusual data access, off-hours activity, mass file downloads, privilege abuse, and resignation-correlated data theft.
Detecting Kerberoasting Attacks
v1.0.0Detect Kerberoasting attacks by monitoring for anomalous Kerberos TGS requests targeting service accounts with SPNs for offline password cracking.
Detecting Lateral Movement In Network
v1.0.0>
Detecting Lateral Movement With Splunk
v1.0.0Detect adversary lateral movement across networks using Splunk SPL queries against Windows authentication logs, SMB traffic, and remote service abuse.
Detecting Living Off The Land Attacks
v1.0.0>
Detecting Living Off The Land With Lolbas
v1.0.0Detect Living Off the Land Binaries (LOLBins/LOLBAS) abuse including certutil, regsvr32, mshta, and rundll32 via process telemetry, Sigma rules, and parent-child process analysis
Detecting Malicious Scheduled Tasks With Sysmon
v1.0.0>
Detecting Mimikatz Execution Patterns
v1.0.0Detect Mimikatz execution through command-line patterns, LSASS access signatures, binary indicators, and in-memory detection of known modules.