filmov
tv
Understanding Kerberoasting
Показать описание
Kerberoasting is the attack that keeps on giving for adversaries and penesters alike. First documented in 2014 by Tim Medin, Kerberoasting is a tactic that can be used after an initial compromise to gain access to alternate accounts in an Active Directory domain.
It typically involves an attacker issuing a series of LDAP queries to a Domain Controller in search of user accounts that possess a value known as a Service Principal Name (SPN).
If this value is set on an account, an attacker can request a service ticket (ST) for the identity, which is encrypted with the account’s NT hash. This service ticket can then be cracked offline by the attacker, which, if successful, will allow them to retrieve the cleartext password of the account.
It typically involves an attacker issuing a series of LDAP queries to a Domain Controller in search of user accounts that possess a value known as a Service Principal Name (SPN).
If this value is set on an account, an attacker can request a service ticket (ST) for the identity, which is encrypted with the account’s NT hash. This service ticket can then be cracked offline by the attacker, which, if successful, will allow them to retrieve the cleartext password of the account.
Learn Active Directory Kerberoasting
Understanding Kerberoasting
Attacking active directory | kerberoasting
Kerberoasting Explained
Kerberoasting Explained | Kerberos Authentication | Active Directory
How Kerberos Works
Attacking Active Directory - Kerberoasting
Kerberoasting Attack Demo
Advent of Cyber 2024 - Day 15: Active Directory | TryHackMe | CyberPranava
Kerberos Simplified - CISSP Exam Prep
AS-REP Roasting & Kerberoasting | Simple Explained
Attack Tutorial: How the Kerberoasting Attack Works
⚠️ Don't Get Roasted! Understanding Kerberoasting Attacks on Your System
Top Active Directory Attacks: Understand, then Prevent and Detect
OSCP Guide to Kerberoasting - Active Directory
Kerberoasting
Hacking Active Directory for Beginners (over 5 hours of content!)
Advanced: Kerberoasting Fundamentals
Kerberoasting - what can we really do
Emulating and Detecting Kerberoasting | Red Canary
SIEGECAST: Kerberoasting & Attacks 101
Active Directory Kerberoasting Attack: A Technical Deep Dive #activedirectory #kerberoasting
0709 Understanding Service Principal Names SPNS
SpecterOps Webinar Week Kerberoasting Revisted
Комментарии