Cyber T and V

Kerberos exploitation attacks


Listen Later

Kerberos exploitation attacks explains that Kerberos authentication, commonly used in enterprise networks, is vulnerable to various attacks. These attacks exploit weaknesses in the protocol's ticketing, encryption, and configuration, allowing attackers to gain unauthorized access or escalate privileges. Some common attacks include Pass-the-Ticket, where stolen tickets are reused to impersonate users, and Kerberoasting, where service account hashes are extracted for offline cracking. The document also discusses Silver Tickets and Golden Tickets, which are forged authentication tokens that grant attackers persistent access. The second source details specific Kerberos exploitation attacks, such as Overpass the Hash, Silver Ticket, Golden Ticket, Kerberos Brute-Force, AS-REP Roast, and Kerberoasting, providing insights into their mechanisms and potential impacts on network security.

...more
View all episodesView all episodes
Download on the App Store

Cyber T and VBy Krishnakumar Mahadevan