Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Black Hat via YouTube

Overview

This course aims to teach learners how to protect Kerberos authentication using network monitoring. The learning outcomes include understanding why attackers target Kerberos, detecting and defeating attacks like Golden Ticket, Forged PAC, and Skeleton Key through network monitoring, and learning about the "Diamond PAC" attack variant. The course teaches skills such as detecting Kerberos attacks, using network monitoring for security, and utilizing the "Kerberos Leash" tool for defense. The teaching method involves a presentation of research findings and the release of a detection tool. The intended audience for this course includes cybersecurity professionals, network administrators, and individuals interested in enhancing their knowledge of network security and authentication protocols.

Syllabus

Watching the Watchdog Protecting Kerberos
Why do Attackers Target Kerberos?
Kerberos: Stealing
The attack campaign • Attackers installed a malware on DC to authenticate as any user by using a secret password
AES vs. RC4: Key Derivation
Attacker + RC4
The Skeleton Key Malware: Kerberos
Skeleton Key Malware Detection
PAC (Privilege Attribute Certificate)
TGT Integrity
Let's Play Spot the Difference
Golden Ticket in the Wild
Diamond PAC exploit
Questions?

Taught by

Black Hat

Reviews

Start your review of Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.