Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Black Hat via YouTube Direct link

Let's Play Spot the Difference

11 of 14

11 of 14

Let's Play Spot the Difference

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Watching the Watchdog Protecting Kerberos
  2. 2 Why do Attackers Target Kerberos?
  3. 3 Kerberos: Stealing
  4. 4 The attack campaign • Attackers installed a malware on DC to authenticate as any user by using a secret password
  5. 5 AES vs. RC4: Key Derivation
  6. 6 Attacker + RC4
  7. 7 The Skeleton Key Malware: Kerberos
  8. 8 Skeleton Key Malware Detection
  9. 9 PAC (Privilege Attribute Certificate)
  10. 10 TGT Integrity
  11. 11 Let's Play Spot the Difference
  12. 12 Golden Ticket in the Wild
  13. 13 Diamond PAC exploit
  14. 14 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.