The attack campaign • Attackers installed a malware on DC to authenticate as any user by using a secret password
5
AES vs. RC4: Key Derivation
6
Attacker + RC4
7
The Skeleton Key Malware: Kerberos
8
Skeleton Key Malware Detection
9
PAC (Privilege Attribute Certificate)
10
TGT Integrity
11
Let's Play Spot the Difference
12
Golden Ticket in the Wild
13
Diamond PAC exploit
14
Questions?
Description:
Explore advanced techniques for safeguarding Kerberos authentication through network monitoring in this Black Hat conference talk. Delve into the vulnerabilities of the Kerberos protocol, a prime target for APT attackers in Windows-based networks. Examine recent attacks like Golden Ticket, Forged PAC, and Skeleton Key, and learn novel defensive strategies to detect and counter these threats. Discover the "Diamond PAC" attack variant and its evasion techniques. Gain insights into AES vs. RC4 key derivation, TGT integrity, and PAC (Privilege Attribute Certificate) exploitation. Learn about the free "Kerberos Leash" tool, designed to implement cutting-edge detection techniques for enhanced network security.
Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring