-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Pentesting Active Directory and Windows-based Infrastructure
By :

It was inevitable that we would reach a point where we must discuss and understand Kerberos. This authentication protocol was built to access services in the network by presenting a valid ticket.
We need a bit more of an understanding of how the protocol works before we can discuss the attack venues available for us. As a good starting point, I can recommend the blog post by hackndo[17]
We have three main subjects – the client, service, and Key Distribution Center (KDC), which is the domain controller. The following diagram[18], which was published on the Microsoft website, explains how it works:
Figure 4.8 – Kerberos in a nutshell
Now let follow the authentication process in more details step-by-step.
Change the font size
Change margin width
Change background colour