AS-REP · Kerberos Authentication Investigation

Analyst Write-Up · AS-REP Attack

Brandon Love brand
AS-REP Challenge
Kerberos AS-REP Roasting · DFIR / Incident Response Report

1) Executive Summary

On Oct 5, 2024, suspicious Kerberos authentication activity was identified involving user Corrado. A Kerberos ticket request using RC4 (0x17) was observed from an internal host (192.168.110.129), followed by a successful network logon and basic post-access discovery activity (whoami.exe).


2) Incident Details

Field Description
Report Type Kerberos Authentication / AS-REP Roasting (Lab)
Analyst Brandon Love
Date/Time Detected 2024-10-05 14:42:44
Severity High
Category Credential Access / Authentication Abuse
Detection Source Windows Security Logs (DC + Workstation)
Systems Affected Domain Controller (Security.evtx), Corrado Workstation Logs
Users Involved Corrado
Business Impact Lab / Training Dataset

3) Timeline of Events

Time Event
2024-10-05 14:42:44 DC Security log shows Kerberos ticket request (Event ID 4768) for Corrado using RC4 (0x17) from 192.168.110.129:49684
2024-10-05 14:48:58 Workstation Security log shows successful logon (Event ID 4624, Logon Type 3) linked to 192.168.110.129
2024-10-05 ~15:01:28 Prefetch indicates whoami.exe execution (post-access validation / discovery)

4) Technical Analysis

DC Evidence (Security.evtx)

Workstation Evidence (Corrado Security Log)

Host Artifact Evidence (Prefetch)

MITRE ATT&CK (Reference)


5) Containment & Eradication (Checked = Completed)


6) Recovery & Verification


7) Root Cause

Activity consistent with AS-REP-roasting-style authentication abuse in a lab dataset: a Kerberos ticket request associated with legacy/weak encryption indicators (RC4 / 0x17), followed by successful access and basic discovery.


8) Recommendations


9) Indicators of Compromise (IOCs)

Type Value Description
IP 192.168.110.129 Source host initiating suspicious Kerberos activity
Account Corrado Targeted user account
Kerberos Event ID 4768 + TicketEncryptionType 0x17 Suspicious ticket request with RC4 indicator
Host Artifact whoami.exe Post-access validation/discovery

10) Appendices (Evidence)