Skip to main content

Questions tagged [kerberos]

Kerberos is a network authentication protocol designed to allow nodes, communicating over a non-secure network, to prove their identity to one another in a secure manner.

1 vote
1 answer
86 views

How is Diffie Hellman PKE with Ephemeral keys performed using Kerberos and KINIT? Has it been implemented yet in MIT or Heimdal Kerberos? I think it might be RFC 9528. I ask because I can't seem to ...
atod's user avatar
  • 47
3 votes
1 answer
400 views

What are is the threat vector comparison using 'pkinit' (public-key) vs 'kinit' (password hash) with Kerberos for authentication and distribution of session keys (CK)? On Unix OS? I'm finding the ...
atod's user avatar
  • 47
0 votes
1 answer
104 views

Why is a password be presented during 'kinit' to authenticate with Kerberos? Cryptographically? In this post the Kerberos protocol is described and it appears to use symmetric keys. Given that, I ...
atod's user avatar
  • 47
3 votes
1 answer
207 views

I’m trying to understand how a user’s domain credentials are stored in the LSASS (Local Security Authority Subsystem Service) process after performing an interactive logon, such as through RDP (Remote ...
Simbxy's user avatar
  • 31
3 votes
0 answers
194 views

The new Kerberos AS-REQ-requested attack is somewhat different from a normal Kerberoast, in that instead of requesting a Service Ticket (for offline cracking) via a normal TGS-REQ, it's requested via ...
Charlieface's user avatar
0 votes
2 answers
104 views

Today I'm playing with kerberos on old solaris10 machine (I know support is ending, security, etc.. is a local vm, used for testing and knownledge). Setup kerberos on Solaris10 server, I made rlogin ...
elbarna's user avatar
  • 243
0 votes
0 answers
94 views

I am learning about interacting with Kerberos from a programming standpoint and have been recreating some of Rubeus's functions as a way of learning (because what better open source program is there ...
user2334659's user avatar
2 votes
0 answers
340 views

I am in a corporate environment with on-premises AD on the company.com domain. We have an AWS VPC hosting some .Net APIs in IIS - the domain these are in is companycloud.com. These APIs are all on the ...
El Ronnoco's user avatar
2 votes
1 answer
107 views

I am solving Tryhackme> Exploiting Active Directory > Task 3. At very last, how new powershell session is opening with the dumped STs? He typed this command... PS> New-PSSession -ComputerName ...
Aryan's user avatar
  • 85
2 votes
2 answers
333 views

Referred to the official microsoft documentation on KCD where they are using the terms KCD & Resource Based Constrained Delegation (RBCD) almost interchangeably which got me confused. They have ...
Aryan's user avatar
  • 85
0 votes
1 answer
100 views

I know that AS (Authentication Server) is a TTP (Trusted Third Party) because it generates keys for two entities (for the client and the TGS). But what about TGS (Ticket Granting Server)? It also ...
allexj's user avatar
  • 537
2 votes
1 answer
155 views

I started to study how the U2U mechanism works and got confused. The gist is as follows. When we use U2U the service ticket will be encrypted with the session key KDC of the user-"server". ...
Deoni Deon's user avatar
1 vote
0 answers
123 views

I know that in Active Directory environments passwords are stored in the form of hashes depending on encryption types used in the environment. I understand also that when using AES as a symmetric ...
Matías Huartamendía's user avatar
1 vote
0 answers
122 views

I'm implementing SPNEGO-based Kerberos authentication for a Linux client application for authenticating requests to a Windows IIS server. I've read RFC4559, which describes how authentication should ...
Shuzheng's user avatar
  • 1,317
0 votes
1 answer
441 views

I am trying to replicate Shadow Credentials attack in Active Directory environment. My initial approach was to: Use Whisker to create a new certificate on behalf of DC (successful): Whisker.exe add /...
Teodor Cristian's user avatar

15 30 50 per page
1
2 3 4 5
12