Главная
Study mode:
on
1
Introduction
2
How Kerberos works
3
Kerberos with Wireshark
4
Service Principle Names
5
How are SPMS created
6
How does Kerberos work
7
Impact
8
PowerShell Wireshark
9
Why cant we just use Wireshark
10
What is known plaintext attack
11
Kerberos keys
12
Preshared keys
13
Generating keys
14
String to key
15
PBK function
16
Why DC keys
17
Generating DC keys
18
Relative cracking speeds
19
Moving from RC4 to 8
20
Moving away from RC4
21
Kerberos Ticket Analysis
22
Kerberos Account Tab
23
LDAP Attribute
24
PowerShell
25
AES Kerberos
26
AES Cracking Speed
27
Invoke Kerberos 2
28
Invoke Kerberos 3
29
The Future Of Kerberos
30
Conclusion
Description:
Explore the intricacies of Kerberos authentication and its future in red team operations through this comprehensive conference talk from Derbycon 7. Delve into the fundamentals of Kerberos, including its inner workings and analysis using Wireshark. Examine Service Principle Names (SPNs) and their creation process. Investigate known plaintext attacks, Kerberos keys, and the importance of DC keys. Learn about the transition from RC4 to AES encryption and its impact on cracking speeds. Discover techniques for Kerberos ticket analysis, including the use of PowerShell and LDAP attributes. Gain insights into the evolution of Kerberos attacks with tools like Invoke-Kerberos. Conclude with a discussion on the future of Kerberos and its implications for red team operations.

Return From The Underworld - The Future Of Red Team Kerberos

Add to list
0:00 / 0:00