AS-Rep Challenge(LetsDefend)

November 26, 2025 · Brandon Love · Tags: letsdefend-writeup, letsdefendio, blueteamlabs, cybersecurity

Originally published on Medium: https://medium.com/@brandonlove2150/as-rep-challenge-letsdefend-cf1dee11b6a5?source=rss-024d132ba4b7——2

Today, I took on another challenge from LetsDefend.

Today, I took on another challenge from LetsDefend. The challenge was simple: analyze the AS-REP attack. This was a great challenge to get more practice reading Windows Security logs, filtering out noisy traffic, and identifying malicious activity.

Background

A network security team received alerts from a Domain Controller (DC) indicating that a user was making unusual requests for Kerberos tickets, which is not typical for their role. Given that this behavior aligns with potential reconnaissance or lateral movement within the network, the security team escalated the issue to a senior investigator. The investigator has been tasked with analyzing the provided DC and workstation logs to trace the attacker’s movements, determine the source of the anomaly, and understand how the attacker gained access and what actions they might have taken inside the network.

AS-REP Attack: I have already covered what an AS-REP attack is in this walkthrough of a GoldenTicket.

Filter Log

Opening the ChallengeFile, there are two folders we need to look at: one for the username Corrado and one titled DC. This is the folder to explore first to answer the challenge questions. Once the security log is opened, to reduce traffic, filter the events by EventID 4678, which corresponds to Kerberos ticket requests.

Search Events by 0x17

Knowing that it is a suspicious Kerberos ticket, search for the RC4 encryption algorithm 0x17; this should point to the needed ticket.

Filtered Log

Looking at the image above, the time that the Kerberos ticket request was made, the user account affected, the SID associated with the user account, the type of encryption used, and the IP and port number that were used to request the ticket.

2024–10–05 14:42:44
-Corrado
-S-1–5–21–3079141193–1468241477–2901848075–1108
-RC4
-192.168.110.129:49684

Corrado Security Log

The next step is to search the Corrado Folder and open the Security file to view these events, as the Corrado account was compromised. Once the log is filtered by EventID 4624 (corresponding to logon), and the IP address 192.168.110.129 is searched for, the first successful logon time will be displayed.

1st time logon

-2024–10–05 14:48:58

The final logs to look at are the prefetch file. Once the date is filtered by time, comparing the commands run at the time the attacker accessed the account shows the first command used. Since I could not get the Zimmerman tools to analyze the whoami command successfully, I examined the properties and added or subtracted 2 seconds from the time the file was modified to find the correct answer.

prefetch file

whoami

2024–10–05 15:01:28

Completion Badge

Case Summary

Incident Type: Kerberos AS-REP Roasting / Credential Access
Severity: High (credential theft can lead to domain compromise)
Primary Finding: A Kerberos TGT request for user Corrado used RC4 encryption (0x17) from a suspicious internal host, 192.168.110.129, followed by a successful network logon and host reconnaissance (whoami.exe).

Key Evidence Observed

Domain Controller (DC) — Security.evtx

Workstation/User Logs (Corrado folder)

Prefetch (Command Execution Indicator)

Timeline (Condensed)

  1. 14:42:44 — Suspicious 4768 TGT request for Corrado using RC4 (0x17) from 192.168.110.129
  2. 14:48:58–4624 successful network logon connected to the same source IP
  3. ~15:01:28 — whoami.exe evidence in Prefetch suggests attacker discovery activity

Assessment & Likely Attack Flow

Indicators of Compromise (IOCs)

MITRE ATT&CK Mapping (Practical)

Immediate containment

Hardening

Detection Ideas (Quick Win Queries)

Windows Event Viewer / SIEM logic

Example correlation filter (plain English)

“Find internal IPs requesting RC4 Kerberos tickets, then check if they log on successfully and run discovery commands shortly after.”

Final Conclusion

This activity is consistent with AS-REP roasting leading into credential misuse, with evidence of successful access and early discovery. The priority is to contain the source host, secure the Corrado account, and validate that no further lateral movement or privilege escalation occurred.

Originally published on Medium: https://medium.com/@brandonlove2150/as-rep-challenge-letsdefend-cf1dee11b6a5?source=rss-024d132ba4b7------2

letsdefend-writeupletsdefendioblueteamlabscybersecurity
SOC205 —Event 231 Malicious Macro has been executed (LetsDefend)
Phishing “Interview Invitation” — Malicious Word Doc.