{"id":27673,"date":"2015-02-11T13:13:45","date_gmt":"2015-02-11T21:13:45","guid":{"rendered":"http:\/\/blogs.microsoft.com\/cybertrust\/?p=27673"},"modified":"2023-08-03T14:40:07","modified_gmt":"2023-08-03T21:40:07","slug":"krbtgt-account-password-reset-scripts-now-available-for-customers","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2015\/02\/11\/krbtgt-account-password-reset-scripts-now-available-for-customers\/","title":{"rendered":"KRBTGT Account Password Reset Scripts now available for customers"},"content":{"rendered":"
Credential theft and reuse attacks continue to be top of mind for many of the CISOs I have talked to recently. We have discussed this topic several times in the past:<\/p>\n
<\/a>Although pass-the-hash credential theft and reuse attacks aren\u2019t new, more recently security researchers have been focusing on attack methods for Kerberos authentication. Kerberos authentication is achieved by the use of tickets enciphered with a symmetric key derived from the password of the server or service to which access is requested. To request such a session ticket, a special ticket, called the Ticket Granting Ticket (TGT) must be presented to the Kerberos service. The TGT is enciphered with a key derived from the password of the krbtgt account, which is known only by the Kerberos service[i]<\/a>.<\/p>\n A stolen krbtgt account password can wreak havoc on an organization because it can be used to impersonate authentication throughout the organization thereby giving an attacker access to sensitive data.<\/p>\n One way to help mitigate the risk of a bad actor using a compromised krbtgt key to forge user tickets is by periodically resetting the krbtgt account password. Resetting this password on a regular basis reduces the useful lifetime of krbtgt keys, in case one or more of them is compromised.<\/p>\n Today we are sharing the krbtgt account password reset script<\/a> and associated guidance that will enable customers to interactively reset and validate replication of the krbtgt account keys on all writable domain controllers in the domain. By providing this script and associated guidance, we hope to help customers perform the reset in a way which reduces the likelihood of authentication errors caused by delayed distribution of the new krbtgt account keys in their environment.<\/p>\n The Reset-KrbtgtKeyInteractive-v1.4 enables customers to:<\/p>\n The krbtgt account password reset script guide includes detailed information on how to use the reset script and its three modes- Informational, Estimation Mode, and Reset and offers:<\/p>\n We\u2019ve also provided a detailed guide which helps system administrators understand the required tasks, impact to the organization, schedule and timeline, and other considerations. Together, this combination covers necessary tasks, tests, and validations that should be performed before and after the reset.<\/p>\n It is important to remember that resetting the krbtgt is only one part of a recovery strategy and alone will likely not prevent a previously successful attacker from obtaining unauthorized access to a compromised environment in the future. We strongly advise that customers create a comprehensive recovery plan using guidance found in the Mitigating Pass-the-Hash and Other Credential Theft, version 2<\/a>.<\/p>\n [i]<\/a> https:\/\/technet.microsoft.com\/en-us\/library\/cc733924(v=ws.10).aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":" Although pass-the-hash credential theft and reuse attacks aren\u2019t new, more recently security researchers have been focusing on attack methods for Kerberos authentication.<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3688],"products":[],"threat-intelligence":[],"tags":[3896,3822,3823],"coauthors":[1954],"class_list":["post-27673","post","type-post","status-publish","format-standard","hentry","content-type-news","topic-threat-trends","tag-credential-theft","tag-microsoft-security-insights","tag-password-protection"],"yoast_head":"\n\n
\n