detecting-golden-ticket-forgery

Installation
SKILL.md

Detecting Golden Ticket Forgery

Overview

A Golden Ticket attack (MITRE ATT&CK T1558.001) involves forging a Kerberos Ticket Granting Ticket (TGT) using the krbtgt account NTLM hash, granting unrestricted access to any service in the Active Directory domain. This skill detects Golden Ticket usage by analyzing Event ID 4769 for RC4 encryption type (0x17) in environments enforcing AES, identifying tickets with abnormal lifetimes exceeding domain policy, correlating TGS requests with missing corresponding TGT requests (Event ID 4768), and detecting krbtgt password age anomalies.

When to Use

  • When investigating security incidents that require detecting golden ticket forgery
  • When building detection rules or threat hunting queries for this domain
  • When SOC analysts need structured procedures for this analysis type
  • When validating security monitoring coverage for related attack techniques

Prerequisites

  • Windows Domain Controller with Kerberos audit logging enabled
  • Splunk or Elastic SIEM ingesting Windows Security event logs
  • Python 3.8+ for offline event log analysis
Related skills
Installs
7
GitHub Stars
6.2K
First Seen
Mar 18, 2026