DS0028 Logon Session
Logon occurring on a system or resource (local, domain, or cloud) to which a user/device is gaining access after successful authentication and authorization1
Item | Value |
---|---|
ID | DS0028 |
Platforms | Azure AD, Google Workspace, IaaS, Linux, Office 365, SaaS, Windows, macOS |
Collection Layers | Cloud Control Plane, Host, Network |
Version | 1.1 |
Created | 20 October 2021 |
Last Modified | 07 December 2022 |
Data Components
Logon Session Creation
Initial construction of a successful new user logon following an authentication attempt. (e.g. Windows EID 4624, /var/log/utmp, or /var/log/wmtp)
Logon Session Metadata
Contextual data about a logon session, such as username, logon type, access tokens (security context, user SIDs, logon identifiers, and logon SID), and any activity associated within it
Domain | ID | Name |
---|---|---|
enterprise | T1133 | External Remote Services |
ics | T0822 | External Remote Services |
enterprise | T1606 | Forge Web Credentials |
enterprise | T1606.002 | SAML Tokens |
ics | T0883 | Internet Accessible Device |
enterprise | T1621 | Multi-Factor Authentication Request Generation |
enterprise | T1558 | Steal or Forge Kerberos Tickets |
enterprise | T1558.001 | Golden Ticket |
enterprise | T1558.002 | Silver Ticket |
enterprise | T1199 | Trusted Relationship |
enterprise | T1078 | Valid Accounts |
enterprise | T1078.002 | Domain Accounts |
enterprise | T1078.003 | Local Accounts |
enterprise | T1078.004 | Cloud Accounts |
ics | T0859 | Valid Accounts |
References
-
Microsoft. (2021, September 6). Audit logon events. Retrieved September 28, 2021. ↩
-
Sarah Edwards. (2020, April 30). Analysis of Apple Unified Logs: Quarantine Edition [Entry 6] – Working From Home? Remote Logins. Retrieved August 19, 2021. ↩
-
Dr. Nestori Syynimaa. (2022, September 20). Exploiting Azure AD PTA vulnerabilities: Creating backdoor and harvesting credentials. Retrieved September 28, 2022. ↩
-
Payne, J. (2015, November 23). Monitoring what matters - Windows Event Forwarding for everyone (even if you already have a SIEM.). Retrieved February 1, 2016. ↩
-
Payne, J. (2015, November 26). Tracking Lateral Movement Part One - Special Groups and Specific Service Accounts. Retrieved February 1, 2016. ↩
-
Microsoft. (2016, April 15). Audit Policy Recommendations. Retrieved June 3, 2016. ↩
-
Atlassian. (2018, January 9). How to Enable User Access Logging. Retrieved April 4, 2018. ↩
-
Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022. ↩
-
Dan Borges. (2019, July 21). MacOS Red Teaming 206: ARD (Apple Remote Desktop Protocol). Retrieved September 10, 2021. ↩
-
Sygnia. (2020, December). Detection and Hunting of Golden SAML Attack. Retrieved January 6, 2021. ↩
-
MSRC. (2020, December 13). Customer Guidance on Recent Nation-State Cyber Attacks. Retrieved December 17, 2020. ↩
-
Microsoft. (2022, August 26). Protecting Microsoft 365 from on-premises attacks. Retrieved February 21, 2023. ↩
-
Bani, M. (2018, February 23). Detecting Kerberoasting activity using Azure Security Center. Retrieved March 23, 2018. ↩
-
Metcalf, S. (2015, December 31). Cracking Kerberos TGS Tickets Using Kerberoast – Exploiting Kerberos to Compromise the Active Directory Domain. Retrieved March 22, 2018. ↩