Тёмный

4 2 1 LDAP, Kerberos, and NTLM 

Cyberkraft
Подписаться 20 тыс.
Просмотров 20 тыс.
50% 1

Опубликовано:

 

17 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 18   
@luvkashyap
@luvkashyap 3 года назад
One of the simplest, easy-to-understand videos on KERBEROS and LDAP !!! Amazing job mate
@Nick-tm8yd
@Nick-tm8yd 24 дня назад
Thank you Mark, really great video and clear explanation of the Kerberos flow
@hadjimaruson3444
@hadjimaruson3444 3 месяца назад
Bless your soul man! easy peasy to understand and have a general notion
@wadewatts1027
@wadewatts1027 2 года назад
Man you just made my day! thanks for this awsome simple but deep explanation of Kerberos and NTLM
@cyberkraft1
@cyberkraft1 2 года назад
I'm glad it helped!
@torchforever
@torchforever 3 года назад
Great intro video, thank you!
@Gokuguy1243
@Gokuguy1243 28 дней назад
Wait so NTLM uses MD5? Is that secure? I thought MD5 encryption is not good practice for security
@lambiolamb
@lambiolamb 4 года назад
Thank you!
@42svb58
@42svb58 3 года назад
Great video!
@Jamesaepp
@Jamesaepp 3 года назад
tomato............tomAAAAAAATo
@cyberkraft1
@cyberkraft1 3 года назад
KerBERos KerBAAAAAHros
@andymcdowl4967
@andymcdowl4967 3 года назад
Благодарю, отличное и познавательное видео.
@worldtreeboy8712
@worldtreeboy8712 Год назад
Hi, does LDAP uses service ticket generated using kerberos to authenticate user? I am confused since both Kerberos and LDAP can authenticate user.
@MrKirkCaptain
@MrKirkCaptain 3 года назад
Hello! Thanks for clarifying this. For NTLMv2 three-step process, the video states "User sends" and "Client responds". The user is the person requesting access and the client is the directory? I know Kerberos has its own server, does NTLM have one too that is separate from the directory?
@MrKirkCaptain
@MrKirkCaptain 3 года назад
Also, where does the "nonce" used in NTLM fit into the process?
@cyberkraft1
@cyberkraft1 3 года назад
Christian, thank you very much for your excellent question! In NTLM there is a three way handshake between the user and the server. First, the user contacts the server to initiate the connection and establish the connection parameters. Second, the server responds with a challenge to the user, which asks for authentication information. The user will then respond with the appropriate credential (a password). The authentication information is stored within the Active Directory (AD). So, the server in this example is the server that houses the AD. A nonce is a number used only once. A 16 bit nonce is generated by the server and send as the challenge to the user. This is the second step in the NTLM authentication process. These authentication protocols can be pretty confusing. I hope this helps clear things up! For the exam, I would focus on remembering the basics of NTLM. Just remember that it is a Windows based authentication method that used a three-way handshake.
@dancooper9377
@dancooper9377 3 года назад
Hi.. A few questions. You say what the values are but what is the purpose of LDAP? i beleive it is for authentication. or is it authorisation? Is LDAP the directory or the protocol to access a directory?
@cyberkraft1
@cyberkraft1 3 года назад
Fantastic questions! LDAP is the protocol used to access a directory. A directory is a type of database that stores information as a tree of entries. Relational databases, in contrast, store information in rows and columns. LDAP allows users to manipulate data within these directories known as "entities". LDAP is very lightweight and flexible as most directory servers support LDAP. In regards to authentication and authorization, LDAP can absolutely be used for authentication. Users would submit credentials to the directory using the LDAP protocol. Authorization is the process of granting access to resources for authenticated users. Access privileges would be assigned to users, usually based on their role within an organization. Much of the confusion with LDAP comes from the fact that LDAP is used to describe the protocol as well as a type of directory supported by LDAP. In our Comprehensive Security+ Course, we go into LDAP in much more detail. You can check out the course here: cyberkrafttraining.com/security-plus-sp/ I hope I was able to answer your questions!
Далее
Security+ Course
5:19
Просмотров 510
Dora was kidnapped and then… 😨 #shorts
00:18
Просмотров 2,8 млн
КОСПЛЕЙ НА СЭНДИ ИЗ СПАНЧБОБА
00:57
How would you react?!😳
00:44
Просмотров 5 млн
Kerberos Explained
12:33
Просмотров 59 тыс.
How to Pass Your CompTIA Exam
19:05
Просмотров 1,5 тыс.
Lightweight Directory Access Protocol (LDAP)
13:59
Просмотров 20 тыс.
Kerberos Explained (In 3 Levels Of Detail)
41:42
Просмотров 52 тыс.
Basic Kerberos Authentication
12:15
Просмотров 100 тыс.
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 343 тыс.
Dora was kidnapped and then… 😨 #shorts
00:18
Просмотров 2,8 млн