]> git.ipfire.org Git - thirdparty/suricata-verify.git/commitdiff
Adds test for kerberos ticket_encryption
authorPhilippe Antoine <contact@catenacyber.fr>
Tue, 12 Jul 2022 07:21:36 +0000 (09:21 +0200)
committerVictor Julien <victor@inliniac.net>
Tue, 13 Sep 2022 09:57:12 +0000 (11:57 +0200)
tests/krb5-kerberoasting/README.md [new file with mode: 0644]
tests/krb5-kerberoasting/kerberoast.pcap [new file with mode: 0644]
tests/krb5-kerberoasting/test.rules [new file with mode: 0644]
tests/krb5-kerberoasting/test.yaml [new file with mode: 0644]

diff --git a/tests/krb5-kerberoasting/README.md b/tests/krb5-kerberoasting/README.md
new file mode 100644 (file)
index 0000000..47a92e7
--- /dev/null
@@ -0,0 +1,3 @@
+Test krb5 ticket encryption feature
+
+Pcap from https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/t1208-kerberoasting
diff --git a/tests/krb5-kerberoasting/kerberoast.pcap b/tests/krb5-kerberoasting/kerberoast.pcap
new file mode 100644 (file)
index 0000000..6206395
Binary files /dev/null and b/tests/krb5-kerberoasting/kerberoast.pcap differ
diff --git a/tests/krb5-kerberoasting/test.rules b/tests/krb5-kerberoasting/test.rules
new file mode 100644 (file)
index 0000000..585c2ba
--- /dev/null
@@ -0,0 +1,3 @@
+alert krb5 any any -> any any (krb5.ticket_encryption: weak; sid:1;)
+alert krb5 any any -> any any (krb5.ticket_encryption: 23; sid:2;)
+alert krb5 any any -> any any (krb5.ticket_encryption: rc4-hmac; sid:3;)
diff --git a/tests/krb5-kerberoasting/test.yaml b/tests/krb5-kerberoasting/test.yaml
new file mode 100644 (file)
index 0000000..bd5ba8a
--- /dev/null
@@ -0,0 +1,33 @@
+requires:
+  min-version: 7
+
+args:
+  - -k none
+
+checks:
+  - filter:
+      count: 0
+      match:
+        event_type: anomaly
+  - filter:
+      count: 1
+      match:
+        event_type: krb5
+        krb5.msg_type: KRB_TGS_REP
+        krb5.ticket_encryption: rc4-hmac
+        krb5.ticket_weak_encryption: true
+  - filter:
+      count: 1
+      match:
+        event_type: alert
+        alert.signature_id: 1
+  - filter:
+      count: 1
+      match:
+        event_type: alert
+        alert.signature_id: 2
+  - filter:
+      count: 1
+      match:
+        event_type: alert
+        alert.signature_id: 3