Beyond RC4 for Windows Authentication
microsoft.com·1d·
Discuss: Hacker News
🌐Network Security
Preview
Report Post

New PowerShell scripts

Instead of manually reviewing the Security Event log on your domain controllers to find problematic RC4 usage via events 4768 and 4769, let’s introduce two new PowerShell scripts that are available to you on the Microsoft Kerberos-Crypto GitHub repository.

List-AccountKeys.ps1

Use this PowerShell script to query the Security Event Log for the new Available Keys field. The script enumerates the keys that are available for the accounts it finds from the event logs, as well as the following information:

  • The time at which an event happened

  • The account name

  • The account type

  • The account keys

PS C:\tools> .\List-AccountKeys.ps1

Time Name Type Keys


1/21/2025 2:00:10 PM LD1$ M…

Similar Posts

Loading similar posts...