Listen "Kerberos exploitation attacks"
Episode Synopsis
Kerberos exploitation attacks explains that Kerberos authentication, commonly used in enterprise networks, is vulnerable to various attacks. These attacks exploit weaknesses in the protocol's ticketing, encryption, and configuration, allowing attackers to gain unauthorized access or escalate privileges. Some common attacks include Pass-the-Ticket, where stolen tickets are reused to impersonate users, and Kerberoasting, where service account hashes are extracted for offline cracking. The document also discusses Silver Tickets and Golden Tickets, which are forged authentication tokens that grant attackers persistent access. The second source details specific Kerberos exploitation attacks, such as Overpass the Hash, Silver Ticket, Golden Ticket, Kerberos Brute-Force, AS-REP Roast, and Kerberoasting, providing insights into their mechanisms and potential impacts on network security.
More episodes of the podcast Cyber T and V
Social Engineering Attacks and Cyber Threats
17/11/2024
Ransomware attacks
17/11/2024
Cryptanalytic attacks
17/11/2024
Active Directory Security
17/11/2024
Top 12 Application Attcks
16/11/2024
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.