SANS Webcast: Kerberos & Attacks 101

  Рет қаралды 27,990

SANS Offensive Operations

SANS Offensive Operations

Күн бұрын

Пікірлер: 8
@su8z3r03
@su8z3r03 Жыл бұрын
@4:54 The statement "Kerberos uses shared secrets for authentication in a Windows domain, there is only one, the NTLM hash" is not entirely accurate. While it is true that NTLM (NT LAN Manager) is a legacy authentication protocol used in Windows environments, Kerberos is the primary authentication protocol used in Active Directory domains. Kerberos does not rely on shared secrets in the same way as NTLM. Instead, it uses a trusted third-party authentication system and symmetric key cryptography to verify the identities of users and services within a network. Kerberos authentication involves the use of tickets and does not directly rely on the storage of password hashes. Furthermore, the statement overlooks the fact that Kerberos also involves the use of a Kerberos hash, which is derived from the user's password and is used in the authentication process. In summary, the statement oversimplifies the authentication mechanisms used in Windows domains and does not accurately represent the role of Kerberos and the use of shared secrets in the context of Windows domain authentication.
@luizfelipegrillo9134
@luizfelipegrillo9134 4 жыл бұрын
Awesome Webcast! Thanks a lot!
@ThePaulSIN
@ThePaulSIN 2 жыл бұрын
Great presentation. Very insightful and educational!
@omarfayyad1
@omarfayyad1 3 жыл бұрын
I loved your presentation mate. Thank you so much for the detailed yet simple explanation! - Thank you sir!
@CyberCelt.
@CyberCelt. 3 жыл бұрын
This was really great. Is there anywhere to download the presentation please?
@candasmith
@candasmith 5 жыл бұрын
Oof, please work on that audio between the two of you.
@stevetollaksen
@stevetollaksen 4 жыл бұрын
Hold up - exceptionally difficult to rotate the KRBTGT password? What process is this dude using to rotate the password? How is waiting 24-48 hours exceptional? My understanding is that you change the password, wait for it to replicate, then change it again. That could take 48 hours if you have globally disparate DC's or set the time to some insane lengths, but the majority of businesses have 1-3 datacenters and replication takes less than an hour. How is that exceptionally difficult to do?
SANS Webcast: PowerShell for PenTesting
59:04
SANS Offensive Operations
Рет қаралды 10 М.
Kerberos and Attacks 101 - Tim Medin
42:58
Wild West Hackin' Fest
Рет қаралды 6 М.
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
Сестра обхитрила!
00:17
Victoria Portfolio
Рет қаралды 958 М.
Hacking Common AD Misconfigurations
33:13
SANS Offensive Operations
Рет қаралды 19 М.
Taming Kerberos - Computerphile
16:06
Computerphile
Рет қаралды 328 М.
Kerberos & Attacks 101
1:00:11
Black Hills Information Security
Рет қаралды 12 М.
A Taste of Kerberos Abuse
1:00:16
SpecterOps
Рет қаралды 2,3 М.
Hacking Active Directory for Beginners (over 5 hours of content!)
5:16:30
The Cyber Mentor
Рет қаралды 211 М.
Abusing Microsoft Kerberos: Sorry You Guys Don't Get It
50:33
Black Hat
Рет қаралды 20 М.
The Stuxnet Story: What REALLY happened at Natanz
37:38
OTbase
Рет қаралды 224 М.
OSCP Guide to Kerberoasting - Active Directory
18:07
Elevate Cyber
Рет қаралды 11 М.
TR19: Fun with LDAP and Kerberos: Attacking AD from non-Windows machines
59:06
TROOPERS IT Security Conference
Рет қаралды 27 М.
Active Directory Certificate Services: The Latest Attacks - with Tim Medin
1:07:36
Мен атып көрмегенмін ! | Qalam | 5 серия
25:41