Remove what-is-kerberos-authentication
article thumbnail

What Is Kerberos Authentication?

Heimadal Security

Today I am going to talk about one of these strategies: the Kerberos authentication protocol. What Is Kerberos? As you know, normally, users […] The post What Is Kerberos Authentication? appeared first on Heimdal Security Blog.

article thumbnail

Domain of Thrones: Part I

Security Boulevard

What we are interested in exploring is what defenders can do beyond those steps. What portions of the organization’s recovery process meet a minimum expectation to cut back the adversary’s stolen access? We will mention any related blogs, tools, or variations of the attack performance.

Backups 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Tier Zero?—?Part 1

Security Boulevard

What is Tier Zero — Part 1 Tier Zero is a crucial group of assets in Active Directory (AD) and Azure. In this blog post series, we will explain how we define Tier Zero and explain what common assets we recommend to be part of Tier Zero. This blog post was written together with Elad Shamir and Justin Kohler.

Backups 59
article thumbnail

What Duo Unix Administrators Need to Know About Pluggable Authentication Modules

Duo's Security Blog

One common hurdle for systems administrators setting up new Duo Unix integrations is PAM — Pluggable Authentication Modules. What is PAM? PAM stands for Pluggable Authentication Modules. It is used to standardize authentication for Linux systems. What Does Duo Use PAM For? Setting Control Flags.

article thumbnail

Koh: The Token Stealer

Security Boulevard

I knew very little about Windows authentication at the time, so when the other red teamer investigated the idea and told us it wasn’t possible, I left it at that. I’ll go over the motivation for this approach, the technical background of why it’s possible and what changed in 2016, and briefly show what Koh can do. Motivation.

article thumbnail

Calling Home, Get Your Callbacks Through RBI

Security Boulevard

This blog post describes methods that SpecterOps consultants have researched to successfully circumvent this technology during offensive assessments. What is RBI and Why Use It? Well, my friend, RBI has many more implications than what the vendors provide at face value. Authored By: Lance B. Why Do We Care?

DNS 64
article thumbnail

A broken marriage. Abusing mixed vendor Kerberos stacks

Pen Test Partners

In hindsight I should have submitted a 45-minute talk as there were some elements missing from what I presented, based on additional research since submitting the CFP. With that in mind, and for those that weren’t able to attend, here’s a follow-up blog post.

DNS 52