CG
SkillsDetecting Golden Ticket Forgery
Start Free
Back to Skills Library
Threat Detection🟡 Intermediate

Detecting Golden Ticket Forgery

Detect Kerberos Golden Ticket forgery by analyzing Windows Event ID 4769 for RC4 encryption downgrades (0x17), abnormal ticket lifetimes, and krbtgt account anomalies in Splunk and Elastic SIEM.

3 min read1 MITRE techniques

Prerequisites

  • Windows Domain Controller with Kerberos audit logging enabled
  • Splunk or Elastic SIEM ingesting Windows Security event logs
  • Python 3.8+ for offline event log analysis
  • Knowledge of domain Kerberos encryption policy (AES vs RC4)

MITRE ATT&CK Coverage

T1558.001

Detecting Golden Ticket Forgery

Overview

A Golden Ticket attack (MITRE ATT&CK T1558.001) involves forging a Kerberos Ticket Granting Ticket (TGT) using the krbtgt account NTLM hash, granting unrestricted access to any service in the Active Directory domain. This skill detects Golden Ticket usage by analyzing Event ID 4769 for RC4 encryption type (0x17) in environments enforcing AES, identifying tickets with abnormal lifetimes exceeding domain policy, correlating TGS requests with missing corresponding TGT requests (Event ID 4768), and detecting krbtgt password age anomalies.

Prerequisites

  • Windows Domain Controller with Kerberos audit logging enabled
  • Splunk or Elastic SIEM ingesting Windows Security event logs
  • Python 3.8+ for offline event log analysis
  • Knowledge of domain Kerberos encryption policy (AES vs RC4)

Steps

  1. Audit domain Kerberos encryption policy to establish AES-only baseline
  2. Forward Event IDs 4768 and 4769 to SIEM platform
  3. Detect RC4 (0x17) encryption in TGS requests where AES is enforced
  4. Identify TGS requests without corresponding TGT requests (forged ticket indicator)
  5. Alert on ticket lifetimes exceeding MaxTicketAge domain policy
  6. Monitor krbtgt account password age and last reset date
  7. Correlate findings with host/user context for risk scoring

Expected Output

JSON report with Golden Ticket indicators including RC4 downgrades, orphaned TGS requests, abnormal ticket lifetimes, and risk-scored alerts with MITRE ATT&CK technique mapping.

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC7.2 (Anomaly Detection)
  • ISO 27001: A.12.4 (Logging & Monitoring)
  • NIST 800-53: SI-4 (System Monitoring), AU-6 (Audit Review)
  • NIST CSF: DE.AE (Anomalies & Events), DE.CM (Continuous Monitoring)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add detecting-golden-ticket-forgery

# Or load dynamically via MCP
grc.load_skill("detecting-golden-ticket-forgery")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add detecting-golden-ticket-forgery
// Or via MCP
grc.load_skill("detecting-golden-ticket-forgery")

Tags

golden-ticketkerberosactive-directorymimikatzsplunkcredential-theftwindows-security

Related Skills

Threat Detection

Detecting Pass the Ticket Attacks

3m·intermediate
Threat Detection

Detecting Credential Dumping Techniques

3m·advanced
Threat Hunting

Detecting Dcsync Attack in Active Directory

3m·intermediate
Red Team & Offensive Security

Conducting Domain Persistence with Dcsync

4m·intermediate
Threat Hunting

Detecting Golden Ticket Attacks in Kerberos Logs

3m·intermediate
Incident Response

Performing Active Directory Compromise Investigation

4m·intermediate

Skill Details

Domain
Threat Detection
Difficulty
intermediate
Read Time
3 min
Code Examples
0
MITRE IDs
1

On This Page

OverviewPrerequisitesStepsExpected OutputVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →