Useful Links
Computer Science
Cybersecurity
Kerberos and NTLM Security Vulnerabilities
1. Foundations of Windows Authentication
2. NTLM Protocol Architecture
3. NTLM Security Vulnerabilities
4. Kerberos Protocol Fundamentals
5. Kerberos Security Vulnerabilities
6. Attack Methodology and Lateral Movement
7. Detection and Monitoring
8. Mitigation and Hardening Strategies
Kerberos Protocol Fundamentals
Kerberos Architecture Components
Key Distribution Center (KDC)
Authentication Service (AS)
Ticket Granting Service (TGS)
KDC Database
Kerberos Realms
Realm Naming Conventions
Cross-Realm Authentication
Trust Relationships
Service Principal Names (SPNs)
SPN Format and Structure
SPN Registration Process
Duplicate SPN Issues
SPN Discovery Methods
Kerberos Tickets and Keys
Ticket-Granting Ticket (TGT)
TGT Structure
Encryption with KRBTGT Key
TGT Lifetime and Renewal
Service Tickets
Service Ticket Structure
Encryption with Service Key
Ticket Lifetime
Session Keys
Session Key Generation
Key Distribution
Key Usage
Long-term Keys
User Keys
Service Keys
KRBTGT Key
Kerberos Authentication Flow
Initial Authentication (AS Exchange)
AS-REQ Message
Pre-authentication Data
AS-REP Message
TGT Issuance
Service Authentication (TGS Exchange)
TGS-REQ Message
TGT Presentation
TGS-REP Message
Service Ticket Issuance
Client-Server Authentication (AP Exchange)
AP-REQ Message
Service Ticket Presentation
AP-REP Message
Mutual Authentication
Kerberos Encryption and Security
Supported Encryption Types
DES (Deprecated)
RC4-HMAC
AES128-CTS-HMAC-SHA1-96
AES256-CTS-HMAC-SHA1-96
Key Derivation
Password-based Key Derivation
Salt Usage
Iteration Counts
Message Integrity
Checksums and MACs
Replay Protection
Timestamp Validation
Previous
3. NTLM Security Vulnerabilities
Go to top
Next
5. Kerberos Security Vulnerabilities