Hello Eli, thank you for your answer.
We have follow the entire ATA Playbook 3 times :
- One when we have deploy the ATA v1.7 in pre-production environment : we have done all the tests with success and all the detections has been raised in the ATA console.
- One when we have deploy the ATA v1.7 in production environment : The test wasn't done because it involve the use of Mimikatz tool (forbidden in production environment).
- One when we have upgrade the pre-production environment to 1.8.1 : we have done all the tests with success but all the detections hasn't raised in the ATA console : directory services enumeration, abnormal modification of sensitive groups and KRBTGT compromise
(DCSync).
Each time (so two times in pre-production environment) we did the KRBTGT compromise test, we have follow the entire ATA Playbook. We use theses commands to do the DCSync :
mimikatz.exe “lsadump::dcsync /domain:contoso.local /user:krbtgt “exit” >> krbtgt-export.txt
For sure we have replace the domain name and we have open then krbtgt-export.txt file, seeing the Hash NTLM of the krbtgt account.
Thank you very much,
Best regards.