Browse Skills

Detecting Golden Ticket Attacks

v1.0.0

>-

mukul975
3

Detecting Golden Ticket Attacks In Kerberos Logs

v1.0.0

Detect Golden Ticket attacks in Active Directory by analyzing Kerberos TGT anomalies including mismatched encryption types, impossible ticket lifetimes, non-existent accounts, and forged PAC signatures in domain controller event logs.

mukul975
4

Detecting Golden Ticket Forgery

v1.0.0

Detect Kerberos Golden Ticket forgery by analyzing Windows Event ID 4769 for RC4 encryption downgrades (0x17), abnormal ticket lifetimes, and krbtgt account anomalies in Splunk and Elastic SIEM

mukul975
4

Detecting Insider Data Exfiltration Via Dlp

v1.0.0

>

mukul975
3

Detecting Insider Threat Behaviors

v1.0.0

Detect insider threat behavioral indicators including unusual data access, off-hours activity, mass file downloads, privilege abuse, and resignation-correlated data theft.

mukul975
3

Detecting Kerberoasting Attacks

v1.0.0

Detect Kerberoasting attacks by monitoring for anomalous Kerberos TGS requests targeting service accounts with SPNs for offline password cracking.

mukul975
3

Detecting Lateral Movement In Network

v1.0.0

>

mukul975
4

Detecting Lateral Movement With Splunk

v1.0.0

Detect adversary lateral movement across networks using Splunk SPL queries against Windows authentication logs, SMB traffic, and remote service abuse.

mukul975
2

Detecting Living Off The Land Attacks

v1.0.0

>

mukul975
5

Detecting Living Off The Land With Lolbas

v1.0.0

Detect Living Off the Land Binaries (LOLBins/LOLBAS) abuse including certutil, regsvr32, mshta, and rundll32 via process telemetry, Sigma rules, and parent-child process analysis

mukul975
3

Detecting Malicious Scheduled Tasks With Sysmon

v1.0.0

>

mukul975
4

Detecting Mimikatz Execution Patterns

v1.0.0

Detect Mimikatz execution through command-line patterns, LSASS access signatures, binary indicators, and in-memory detection of known modules.

mukul975
4