Главная
Study mode:
on
1
Intro
2
# whoami
3
Background
4
Key Encryption Types
5
Using the Goods
6
Approaches
7
Kerberoasting Defenses
8
SupportedEncryption Types
9
Why Care?
10
Downsides of Built-in Ticket Request Methods
11
Obtaining a User's TGT: The "tgtdeleg" Trick
12
Rubeus: Building a Better Kerberoast
13
Credits
Description:
Explore Kerberoasting techniques and defenses in this 22-minute conference talk by Will Schroeder at Derbycon 2019. Learn about key encryption types, approaches to Kerberoasting, and the downsides of built-in ticket request methods. Discover the "tgtdeleg" trick for obtaining a user's TGT and how Rubeus can build a better Kerberoast. Gain insights into supported encryption types and understand why they matter in the context of network security.

Kerberoasting Revisited

Add to list
0:00 / 0:00