Return From The Underworld - The Future Of Red Team Kerberos

Return From The Underworld - The Future Of Red Team Kerberos

via YouTube Direct link

Why DC keys

16 of 30

16 of 30

Why DC keys

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Return From The Underworld - The Future Of Red Team Kerberos

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 How Kerberos works
  3. 3 Kerberos with Wireshark
  4. 4 Service Principle Names
  5. 5 How are SPMS created
  6. 6 How does Kerberos work
  7. 7 Impact
  8. 8 PowerShell Wireshark
  9. 9 Why cant we just use Wireshark
  10. 10 What is known plaintext attack
  11. 11 Kerberos keys
  12. 12 Preshared keys
  13. 13 Generating keys
  14. 14 String to key
  15. 15 PBK function
  16. 16 Why DC keys
  17. 17 Generating DC keys
  18. 18 Relative cracking speeds
  19. 19 Moving from RC4 to 8
  20. 20 Moving away from RC4
  21. 21 Kerberos Ticket Analysis
  22. 22 Kerberos Account Tab
  23. 23 LDAP Attribute
  24. 24 PowerShell
  25. 25 AES Kerberos
  26. 26 AES Cracking Speed
  27. 27 Invoke Kerberos 2
  28. 28 Invoke Kerberos 3
  29. 29 The Future Of Kerberos
  30. 30 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.