TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

What’s trust among schoolchildren: Kerberos Authentication Explained

BHIS · 2016-05-13 · Read original ↗

ATT&CK techniques detected

9 predictions
T1558.003Kerberoasting
77%
"domain controller is your friend, and the desired service is your crush. - a user asks the local domain controller to talk in the open. - the domain controller gives the user a key so the user can continue to talk to it. - the user asks the domain controller for access to a servi…"
T1558Steal or Forge Kerberos Tickets
51%
"##net article. the article is one or two steps removed from the rfc ’ s which specify the protocol, but it does a fine job explaining where microsoft has altered the protocol in order to speed up operations or to provide authorization facilities. additionally, it provides a step …"
T1558.003Kerberoasting
50%
"domain controller using kerberos, is demoed throughout the presentation. while this is a great presentation, i would recommend reading the sans article first since the talk shows working demos of almost every exploit mentioned in the sans post above. all in all, kerberos, while o…"
T1558Steal or Forge Kerberos Tickets
42%
"domain controller using kerberos, is demoed throughout the presentation. while this is a great presentation, i would recommend reading the sans article first since the talk shows working demos of almost every exploit mentioned in the sans post above. all in all, kerberos, while o…"
T1558.004AS-REP Roasting
42%
"what ’ s trust among schoolchildren : kerberos authentication explained what ’ s trust among schoolchildren : kerberos authentication explained logan lembke / / kerberos authentication can be daunting but is an important protocol to understand for any it professional, and especia…"
T1558Steal or Forge Kerberos Tickets
40%
"what ’ s trust among schoolchildren : kerberos authentication explained what ’ s trust among schoolchildren : kerberos authentication explained logan lembke / / kerberos authentication can be daunting but is an important protocol to understand for any it professional, and especia…"
T1558.004AS-REP Roasting
35%
"##net article. the article is one or two steps removed from the rfc ’ s which specify the protocol, but it does a fine job explaining where microsoft has altered the protocol in order to speed up operations or to provide authorization facilities. additionally, it provides a step …"
T1558.003Kerberoasting
32%
"##net article. the article is one or two steps removed from the rfc ’ s which specify the protocol, but it does a fine job explaining where microsoft has altered the protocol in order to speed up operations or to provide authorization facilities. additionally, it provides a step …"
T1558.003Kerberoasting
31%
"what ’ s trust among schoolchildren : kerberos authentication explained what ’ s trust among schoolchildren : kerberos authentication explained logan lembke / / kerberos authentication can be daunting but is an important protocol to understand for any it professional, and especia…"

Summary

Logan Lembke // Kerberos authentication can be daunting but is an important protocol to understand for any IT professional, and especially important in the field of information security. While you […]

The post What’s trust among schoolchildren: Kerberos Authentication Explained appeared first on Black Hills Information Security, Inc..