Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Black Hat via YouTube Direct link

Diamond PAC exploit

13 of 14

13 of 14

Diamond PAC exploit

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Watching the Watchdog Protecting Kerberos
  2. 2 Why do Attackers Target Kerberos?
  3. 3 Kerberos: Stealing
  4. 4 The attack campaign • Attackers installed a malware on DC to authenticate as any user by using a secret password
  5. 5 AES vs. RC4: Key Derivation
  6. 6 Attacker + RC4
  7. 7 The Skeleton Key Malware: Kerberos
  8. 8 Skeleton Key Malware Detection
  9. 9 PAC (Privilege Attribute Certificate)
  10. 10 TGT Integrity
  11. 11 Let's Play Spot the Difference
  12. 12 Golden Ticket in the Wild
  13. 13 Diamond PAC exploit
  14. 14 Questions?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.