CG
SkillsDetecting Pass the Ticket Attacks
Start Free
Back to Skills Library
Threat Detection🟡 Intermediate

Detecting Pass the Ticket Attacks

Detect Kerberos Pass-the-Ticket (PtT) attacks by analyzing Windows Event IDs 4768, 4769, and 4771 for anomalous ticket usage patterns in Splunk and Elastic SIEM.

3 min read1 MITRE techniques

Prerequisites

  • Windows Domain Controller with advanced audit policy enabled (Audit Kerberos Authentication Service, Audit Kerberos Service Ticket Operations)
  • Splunk or Elastic SIEM ingesting Windows Security event logs
  • Sysmon deployed on endpoints for supplementary process telemetry
  • Python 3.8+ with `requests` library

MITRE ATT&CK Coverage

T1550.003

Detecting Pass-the-Ticket Attacks

Overview

Pass-the-Ticket (PtT) is a credential theft technique (MITRE ATT&CK T1550.003) where adversaries steal Kerberos tickets (TGT or TGS) from one system and replay them on another to authenticate without knowing the user's password. This guide walks you through detection of PtT attacks by correlating Windows Security Event IDs 4768 (TGT request), 4769 (TGS request), and 4771 (pre-authentication failure) for anomalies such as ticket reuse across different hosts, RC4 encryption downgrades, and unusual service ticket request volumes.

Prerequisites

  • Windows Domain Controller with advanced audit policy enabled (Audit Kerberos Authentication Service, Audit Kerberos Service Ticket Operations)
  • Splunk or Elastic SIEM ingesting Windows Security event logs
  • Sysmon deployed on endpoints for supplementary process telemetry
  • Python 3.8+ with requests library

Steps

  1. Enable Kerberos audit logging on Domain Controllers via Group Policy
  2. Forward Event IDs 4768, 4769, and 4771 to SIEM platform
  3. Deploy detection rules for RC4 encryption downgrade (TicketEncryptionType 0x17)
  4. Create correlation rule for ticket reuse across multiple source IPs
  5. Build baseline of normal TGS request volume per user/host
  6. Alert on standard deviation anomalies in ticket request patterns
  7. Investigate flagged events with enrichment from Active Directory

Expected Output

JSON report containing detected PtT indicators including anomalous ticket requests, RC4 downgrades, cross-host ticket reuse events, and risk-scored users with MITRE ATT&CK technique mapping.

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC7.2 (Anomaly Detection)
  • ISO 27001: A.12.4 (Logging & Monitoring)
  • NIST 800-53: SI-4 (System Monitoring), AU-6 (Audit Review)
  • NIST CSF: DE.AE (Anomalies & Events), DE.CM (Continuous Monitoring)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add detecting-pass-the-ticket-attacks

# Or load dynamically via MCP
grc.load_skill("detecting-pass-the-ticket-attacks")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add detecting-pass-the-ticket-attacks
// Or via MCP
grc.load_skill("detecting-pass-the-ticket-attacks")

Tags

kerberospass-the-ticketactive-directorysplunkelasticcredential-theftwindows-security

Related Skills

Threat Detection

Detecting Golden Ticket Forgery

3m·intermediate
Threat Detection

Detecting Credential Dumping Techniques

3m·advanced
Threat Hunting

Detecting Dcsync Attack in Active Directory

3m·intermediate
Security Operations

Analyzing Windows Event Logs in Splunk

5m·intermediate
Security Operations

Building Detection Rules with Sigma

5m·intermediate
Red Team & Offensive Security

Conducting Pass the Ticket Attack

3m·intermediate

Skill Details

Domain
Threat Detection
Difficulty
intermediate
Read Time
3 min
Code Examples
0
MITRE IDs
1

On This Page

OverviewPrerequisitesStepsExpected OutputVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →