<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XQL - Hunt for Kerberos Relay Up Activity in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunt-for-kerberos-relay-up-activity/m-p/483039#M1923</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163390"&gt;@KanwarSingh01&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for sure it will be useful for many people&amp;nbsp;&lt;/P&gt;&lt;P&gt;KR,&lt;/P&gt;&lt;P&gt;Luis&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 27 Apr 2022 06:58:31 GMT</pubDate>
    <dc:creator>eluis</dc:creator>
    <dc:date>2022-04-27T06:58:31Z</dc:date>
    <item>
      <title>XQL - Hunt for Kerberos Relay Up Activity</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunt-for-kerberos-relay-up-activity/m-p/483034#M1922</link>
      <description>&lt;P&gt;Just posting, if this is useful for someone who might be hunting for Kerberos Relay Up (Privilege Escalation on Windows System) Activity.&lt;/P&gt;&lt;P&gt;The purpose of this hunt is to look for suspicious logon on windows system using Kerberos Auth Package where the source of logon is localhost IP and user account is Administrator SID.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;dataset = xdr_data
| filter event_type = ENUM.EVENT_LOG
| filter action_evtlog_event_id = 4624
| alter
        auth_package = arrayindex(regextract(action_evtlog_message,"Authentication Package:\s(\w+)"),0),
        network = arrayindex(regextract(action_evtlog_message,"Source Network Address:\s(.*)\r\n"),0),
        logon_type = arrayindex(regextract(action_evtlog_message,"Logon Type:\s+(\d+)\r\n"),0),
        sid = arrayindex(regextract(action_evtlog_message,"Security ID:\s+(.*?-500)\r\n"),0)
| filter auth_package = "Kerberos" and logon_type = "3" and sid ~= ".*500" and network in ("127.0.0.1","::1")
| fields
_time as Time,
agent_hostname as Host,
agent_ip_addresses as IP,
auth_package,sid,logon_type,network as Event_Log_Source_Network,
actor_process_image_name as Process&lt;/LI-CODE&gt;&lt;P&gt;Please feel free to suggest if anything can be improved.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 06:25:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunt-for-kerberos-relay-up-activity/m-p/483034#M1922</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2022-04-27T06:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: XQL - Hunt for Kerberos Relay Up Activity</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunt-for-kerberos-relay-up-activity/m-p/483039#M1923</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163390"&gt;@KanwarSingh01&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for sure it will be useful for many people&amp;nbsp;&lt;/P&gt;&lt;P&gt;KR,&lt;/P&gt;&lt;P&gt;Luis&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 06:58:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunt-for-kerberos-relay-up-activity/m-p/483039#M1923</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2022-04-27T06:58:31Z</dc:date>
    </item>
  </channel>
</rss>

