YoVDO

Kerberoasting Revisited

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Encryption Courses Kerberoasting Courses

Course Description

Overview

Explore Kerberoasting techniques and defenses in this 22-minute conference talk by Will Schroeder at Derbycon 2019. Learn about key encryption types, approaches to Kerberoasting, and the downsides of built-in ticket request methods. Discover the "tgtdeleg" trick for obtaining a user's TGT and how Rubeus can build a better Kerberoast. Gain insights into supported encryption types and understand why they matter in the context of network security.

Syllabus

Intro
# whoami
Background
Key Encryption Types
Using the Goods
Approaches
Kerberoasting Defenses
SupportedEncryption Types
Why Care?
Downsides of Built-in Ticket Request Methods
Obtaining a User's TGT: The "tgtdeleg" Trick
Rubeus: Building a Better Kerberoast
Credits


Related Courses

Building Geospatial Apps on Postgres, PostGIS, & Citus at Large Scale
Microsoft via YouTube
Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube
Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube
What's New in Grails 2.0
ChariotSolutions via YouTube
Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube