Skip to content

Active Directory: Credential Harvesting and Password Attacks

1. Password Spraying: The Stealthy Brute Force

Section titled “1. Password Spraying: The Stealthy Brute Force”

Unlike traditional brute force, Password Spraying involves testing a single, common password (e.g., Welcome2025!) against a large number of accounts.

This technique is designed to bypass account lockout policies. By spreading attempts across hundreds of users, the attacker stays under the radar of most automated blocking systems, betting that at least one user has chosen a weak, seasonal password.

  • Logon Failures: Monitor Domain Controllers for a high volume of Event ID 4625 originating from a single IP address but targeting multiple distinct usernames in a short timeframe.
  • Protocol: These attempts often occur via NTLM or LDAP.

2. AS-REP Roasting: Exploiting Pre-Authentication Flaws

Section titled “2. AS-REP Roasting: Exploiting Pre-Authentication Flaws”

AS-REP Roasting targets users with the specific attribute “Do not require Kerberos pre-authentication” enabled.

Normally, a user must prove they know their password before the DC issues a ticket. If pre-authentication is disabled, an attacker can request an authentication data (AS-REP) for that user. This data is encrypted with the user’s password hash and can be cracked offline.

  1. Configuration Audit: Regularly identify accounts with DONT_REQ_PREAUTH set in their UserAccountControl attribute.
  2. Event Monitoring: Look for Event ID 4768 (TGT Request). A successful request with a result code of 0x0 where pre-authentication was not used is a definitive marker.

3. Kerberoasting: Targeting Service Accounts

Section titled “3. Kerberoasting: Targeting Service Accounts”

Kerberoasting is one of the most effective ways to escalate privileges. It targets accounts associated with a Service Principal Name (SPN).

Any authenticated domain user can request a Service Ticket (TGS) for any service in the forest. The DC returns a ticket encrypted with the hash of the Service Account. The attacker extracts this ticket from memory and cracks it offline to retrieve the password.

  • Bulk Requests: Monitor for Event ID 4769 (Service Ticket Request). An anomaly occurs when a single user or machine requests tickets for multiple unrelated services in a very short interval.
  • Encryption Downgrade: Pay close attention to requests using weak encryption like RC4 (type 0x17), which are significantly easier to crack than AES.

Attack TypeTargetKey Event IDMitigation
Password SprayingAll Domain Users4625 (Massive)MFA & Strong Password Policy
AS-REP RoastingMisconfigured Accounts4768 (Result 0x0)Enforce Kerberos Pre-auth
KerberoastingService Accounts (SPNs)4769 (Abnormal)Long/Random Service Passwords

GMSA Usage

Use Group Managed Service Accounts (gMSA). They have 240-character passwords managed by Windows, making Kerberoasting practically impossible to crack.

Honey Accounts

Create “Honey-SPN” accounts. Any request for a ticket on these accounts should trigger an immediate high-priority alert in your SOC.