Pwning Kerberos
-
Kerberos Delegation Attacks (part2)
In a previous blog post, we discussed Kerberos Delegation Attacks. We briefly explained the different attack types, compared them, and finally attacked the Constrained Delegation type. In this blog post,…
-
Kerberos Delegation Attacks (part1)
Kerberos Constrained Delegation is a powerful security feature in Microsoft’s Active Directory that enables a service to act on behalf of a user and securely access resources. This advanced capability…
-
AS-REP Roasting: A Recipe for Kerberos Credential Theft
AS-REP Roasting attacks are credential theft attacks that target the Kerberos authentication protocol in Microsoft Active Directory environments. The attack exploits a vulnerability in how Kerberos handles authentication requests, allowing…
-
Kerberoasting – attacking the three-headed dog
When people log into computers, they typically do so by entering a password. However, the problem with this method is that if someone gets hold of the password, they can…