YoVDO

Return From The Underworld - The Future Of Red Team Kerberos

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Wireshark Courses PowerShell Courses LDAP Courses AES Courses Network Administration Courses

Course Description

Overview

Explore the intricacies of Kerberos authentication and its future in red team operations through this comprehensive conference talk from Derbycon 7. Delve into the fundamentals of Kerberos, including its inner workings and analysis using Wireshark. Examine Service Principle Names (SPNs) and their creation process. Investigate known plaintext attacks, Kerberos keys, and the importance of DC keys. Learn about the transition from RC4 to AES encryption and its impact on cracking speeds. Discover techniques for Kerberos ticket analysis, including the use of PowerShell and LDAP attributes. Gain insights into the evolution of Kerberos attacks with tools like Invoke-Kerberos. Conclude with a discussion on the future of Kerberos and its implications for red team operations.

Syllabus

Introduction
How Kerberos works
Kerberos with Wireshark
Service Principle Names
How are SPMS created
How does Kerberos work
Impact
PowerShell Wireshark
Why cant we just use Wireshark
What is known plaintext attack
Kerberos keys
Preshared keys
Generating keys
String to key
PBK function
Why DC keys
Generating DC keys
Relative cracking speeds
Moving from RC4 to 8
Moving away from RC4
Kerberos Ticket Analysis
Kerberos Account Tab
LDAP Attribute
PowerShell
AES Kerberos
AES Cracking Speed
Invoke Kerberos 2
Invoke Kerberos 3
The Future Of Kerberos
Conclusion


Related Courses

Criptología Matemática
Universidad de Murcia via Miríadax
Symmetric Cryptography
University of Colorado System via Coursera
Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Cryptography
Caleb Curry via YouTube