Тёмный

I Trusted You A Demonstrated Abuse of Cloud Kerberos Trust - Daniel Heinsen, Elad Shamir 

fwd:cloudsec
Подписаться 3,5 тыс.
Просмотров 1,1 тыс.
50% 1

Abstract: Microsoft has introduced a variety of protocols to abate the issue of authenticating to Azure AD and AD seamlessly. In the Windows Hello For Business setup, Cloud Kerberos Trust has been introduced to enable users to authenticate to Azure AD and still be able to access resources protected by legacy authentication mechanisms, like Kerberos. While this deployment model offers greater convenience, the ability to forge authentication material is delegated to Azure AD. This ability can be abused by attackers to breach the Cloud/On-Premises security boundary in a variety of ways. In this talk, we will discuss the implications of entrusting an external entity with such a sensitive capability and the existential issue of synchronizing data between two equally important sources of truth. We will demonstrate how an attacker can abuse Cloud Kerberos Trust to authenticate as non-synced on-premises users, violating the security boundary between Azure AD and Active Directory and ensuring that attackers don’t need to rely on a misconfiguration such as an administrator being synced to Azure AD. Lastly, we will discuss how to mitigate the issue and how to identify potential misconfigurations that may lead to issues unique to your environment.
fwdcloudsec.or...

Опубликовано:

 

6 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 1   
Далее
Нарвался на сотрудника ФСБ⚡️
01:00
Kerberos Explained (In 3 Levels Of Detail)
41:42
Просмотров 51 тыс.
Elevating Kerberos to the Next Level
40:28
Просмотров 5 тыс.
Windows Hello for Business Part 1
1:00:49
Просмотров 20 тыс.