Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Return From The Underworld - The Future Of Red Team Kerberos
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 How Kerberos works
- 3 Kerberos with Wireshark
- 4 Service Principle Names
- 5 How are SPMS created
- 6 How does Kerberos work
- 7 Impact
- 8 PowerShell Wireshark
- 9 Why cant we just use Wireshark
- 10 What is known plaintext attack
- 11 Kerberos keys
- 12 Preshared keys
- 13 Generating keys
- 14 String to key
- 15 PBK function
- 16 Why DC keys
- 17 Generating DC keys
- 18 Relative cracking speeds
- 19 Moving from RC4 to 8
- 20 Moving away from RC4
- 21 Kerberos Ticket Analysis
- 22 Kerberos Account Tab
- 23 LDAP Attribute
- 24 PowerShell
- 25 AES Kerberos
- 26 AES Cracking Speed
- 27 Invoke Kerberos 2
- 28 Invoke Kerberos 3
- 29 The Future Of Kerberos
- 30 Conclusion