Тёмный

Getting Passwords When Kerberos Pre-Auth IS Enabled 

VbScrub
Подписаться 10 тыс.
Просмотров 10 тыс.
50% 1

A quick look at an alternative way of getting passwords from Kerberos even when you can't use GetNPUsers.py because pre-auth is enabled. My previous video on Kerberos pre-auth can be found here: • GetNPUsers & Kerberos ...
My blog: vbscrub.com
Hashcat BETA: hashcat.net/beta/

Опубликовано:

 

26 фев 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 13   
@secretroamer4962
@secretroamer4962 4 года назад
Best videos i have ever watched on Kerberos. May god bless you
@SP-hz5tp
@SP-hz5tp 4 года назад
Nice explanation! Always happy to see new content.
@pawarvikram03
@pawarvikram03 4 года назад
For more notes on kerberos visit the best website educationlinks.in/what-is-kerberos/
@IgnitedIce81
@IgnitedIce81 2 года назад
Thank you so much! you helped me with a CTF challange I tried for days
@nareshkaushik7117
@nareshkaushik7117 4 года назад
Your content is amazing, thanks a lot!!
@pawarvikram03
@pawarvikram03 4 года назад
For more notes on kerberos visit the best website educationlinks.in/what-is-kerberos/
@adityadeshwal3406
@adityadeshwal3406 3 года назад
Great video man. You have gained a new subscriber. To protect the pre-auth data kerberos error spoofing , Kerberos armoring can be implemented. Please make a video on that if possible.
@6cylbmw
@6cylbmw 4 года назад
Another great video!
@pawarvikram03
@pawarvikram03 4 года назад
For more notes on kerberos visit the best website educationlinks.in/what-is-kerberos/
@spotifyfan8084
@spotifyfan8084 4 года назад
Hi vb! Great vid first of all, learned a ton, but i have one small question. At the beginning of the video, you show the as-req request that the client makes to the DC and that request contains the timestamp that has been encrypted by the client's password. I was able to capture the as-req packet in wireshark and i was able to see the cipher that represents that timestamp encrypted with the users password. But one thing that wasn't the same for me as for you, is that the etype for the hash was 23 and not 18 as shown in your example. In the vid, you also said that the etype 23 is weaker that etype 18 so its easier to crack. I tried running hashcat against the hash for type 18 and type 23 but i didn't get any results even though i put the right password as first in the wordlist. I heard that you said found some blog posts online when people demonstrate the same attack and their etype is 23, Could you please send me some of these blogs so i can try to crack my hash? Thanks a lot, in advance : )
@ahashef
@ahashef 3 года назад
May be not common for CTFs but very likely to happen in any type of Pentest as good old tcpdump should always be running while testing ;) Who knows... maybe someone configured a Vuln Scanner for an authenticated scan with a very bad password? Sniffing and cracking are still actual whatever we say. Always check your RoE and Scope though)))
@yaraj3155
@yaraj3155 2 года назад
I need to ask you
@pawarvikram03
@pawarvikram03 4 года назад
For more notes on kerberos visit the best website educationlinks.in/what-is-kerberos/
Далее
Kerberos Golden Ticket Attack Explained
14:24
Просмотров 39 тыс.
Kerberos Explained (In 3 Levels Of Detail)
41:42
Просмотров 49 тыс.
Gặp 2 thánh troll | CHANG DORY | ometv
00:42
Просмотров 24 млн
GetNPUsers & Kerberos Pre-Auth Explained
21:06
Просмотров 18 тыс.
Taming Kerberos - Computerphile
16:06
Просмотров 320 тыс.
Emulating and Detecting Kerberoasting | Red Canary
38:21
Kerberos Authentication Explained | A deep dive
16:52
Просмотров 330 тыс.
Impacket GetUserSPNs & Kerberoasting Explained
18:58
Просмотров 25 тыс.
Kerberos Silver Ticket Attack Explained
20:20
Просмотров 14 тыс.
NTLM vs Kerberos Authentication
8:08
Просмотров 3,6 тыс.
DC Sync Attacks With Secretsdump.py
20:25
Просмотров 16 тыс.
SANS Webcast: Kerberos & Attacks 101
46:38
Просмотров 26 тыс.