{"id":392,"date":"2024-03-23T06:37:40","date_gmt":"2024-03-23T06:37:40","guid":{"rendered":"https:\/\/jsec-rt.com\/?p=392"},"modified":"2024-07-08T22:53:28","modified_gmt":"2024-07-09T02:53:28","slug":"rt-ataques-conocidos-sobre-kerberos-parte-1-2","status":"publish","type":"post","link":"https:\/\/jsec-rt.com\/index.php\/en\/2024\/03\/23\/rt-ataques-conocidos-sobre-kerberos-parte-1-2\/","title":{"rendered":"RT &#8211; Kerberos known attacks &#8211; Part 1"},"content":{"rendered":"\n<p>An important part of the authentication mechanisms and protocols used by Active Directory is Kerberos, which in short, establishes a secure authentication channel between trusted hosts on an untrusted network.<\/p>\n\n\n\n<p>Some of the objectives of a Kerberos authentication process are listed in the following section<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Passwords are not transmitted over the network.<\/li>\n\n\n\n<li>Passwords are not stored on client operating systems and must be discarded immediately after use.<\/li>\n\n\n\n<li>Passwords are not stored in clear text, even on authentication servers.<\/li>\n\n\n\n<li>A password is entered only once per session, similar to an SSO (Single Sign-on) process, since it requires authentication of a user only once, allowing access to the resources authorized for that user.<\/li>\n\n\n\n<li>All authentication information is centralized in an authentication server. Application servers do not store any authentication information, allowing the following features to be implemented:\n<ul class=\"wp-block-list\">\n<li>An administrator can disable authorization for a user on any application server from the centralized authentication server. Access to individual servers is not required to revoke authorization.<\/li>\n\n\n\n<li>A user&#8217;s password is sufficient to access all services authenticated by Kerberos. A user can reset his pass only once, regardless of the number of services he is authenticated to.<\/li>\n\n\n\n<li>Protection of user information is simplified since all authentication information is located on a centralized server instead of multiple servers where the user has access.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>All parties, users and application servers, must authenticate each other when required. Users authenticate when logging in, application services can be configured to request authentication to the client.<\/li>\n\n\n\n<li>Kerberos provides a mechanism for clients and servers to establish an encrypted circuit in order to keep network communications private.<\/li>\n<\/ul>\n\n\n\n<p>As an attacker, we can identify the following interesting points.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Compromising a domain account that has access to services authenticated by Kerberos gives us practical control over the respective services and possibly their servers.<\/li>\n\n\n\n<li>A user can have access to multiple services.<\/li>\n\n\n\n<li>It is possible that the accounts used are service accounts, so there is a possibility that the passwords used have not been changed in a long time or are of low complexity.<\/li>\n\n\n\n<li>They are a different protocol, so it is possible that monitoring processes on authentication attempts in the active directory are not monitoring authentications by Kerberos.<\/li>\n<\/ul>\n\n\n\n<p>Now, we&#8217;re gonna explore some known Kerberos vulnerabilities and\/or misconfigurations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SPN Tickets<\/h2>\n\n\n\n<p>Service Principal Name (SPN), is a unique identifier of an instance of a specific service. They are used by Kerberos authentication to associate a service instance with a service domain account.<\/p>\n\n\n\n<p>Using the Active Directory test environment we set up in a previous post, we will generate SPN tickets for 2 different users and then from a Kali machine we will query for them and perform the cracking process.<\/p>\n\n\n\n<p>We access the domain controller as domain administrator and run Powershell with administrative privileges.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1024x640.png\" alt=\"\" class=\"wp-image-90\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1024x640.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-300x187.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-768x480.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image.png 1521w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We&#8217;re going to use the &#8220;SetSPN&#8221; cmdlet.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"658\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1-1024x658.png\" alt=\"\" class=\"wp-image-91\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1-1024x658.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1-300x193.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1-768x493.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-1.png 1482w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We have multiple options, all of them with the proper documentation, for our exercise, we&#8217;re going to use the flag &#8220;-A&#8221;, that will allow us to set up a new ticket belonging to an internal user. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"647\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-2-1024x647.png\" alt=\"\" class=\"wp-image-92\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-2-1024x647.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-2-300x190.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-2-768x485.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-2.png 1518w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This way, we have a SPN ticket created for the &#8220;Administrator&#8221; user, now we&#8217;re going to create another one for a new domain user called &#8220;Service_BD&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"645\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-3-1024x645.png\" alt=\"\" class=\"wp-image-93\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-3-1024x645.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-3-300x189.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-3-768x484.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-3.png 1514w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the screenshot an error was obtained when executing the command &#8220;Duplicate SPN Found, aborting operation!&#8221;, this is because an attempt was made to create a new SPN for a service instance that already has an SPN assigned, since SPN tickets associate a service instance to a service domain account, a new ticket cannot be defined, it would be as if we were telling the domain that a single session is being initiated in the service with two different users. For simplicity purposes, we assigned the ticket to a service in a different port.<\/p>\n\n\n\n<p>Now, we can use the impacket suite to obtain these tickets and the corresponding hashes, that can be cracked offline, revealing service accounts passwords, in case they&#8217;re weak.<\/p>\n\n\n\n<p>It&#8217;s necessary to have a valid domain account to be able to query the tickets.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"273\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-4-1024x273.png\" alt=\"\" class=\"wp-image-94\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-4-1024x273.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-4-300x80.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-4-768x205.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-4.png 1378w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Using a low privilege account, we obtain the list of registered tickets, for the user &#8220;Administrator&#8221; and &#8220;Service_BD&#8221;, however, we do not observe any encrypted value that we can save in a text file and then try to crack, to request the value of the respective ticket we add the parameter &#8220;-request&#8221; to the command used.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"251\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-5-1024x251.png\" alt=\"\" class=\"wp-image-96\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-5-1024x251.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-5-300x74.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-5-768x188.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-5-1536x376.png 1536w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-5.png 1889w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Note: If you get a message like &#8220;clock_skew_too_great&#8221; whenever you try to run the command, you must synchronize the attacker host time with the domain controller time.<\/p>\n\n\n\n<p>Since usually the domain controller can also work as an NTP server, the command that does the trick is &#8220;sudo rdate -n IP-DC&#8221;<\/p>\n\n\n\n<p>Once the problem is solved, we get the respective TGS tickets, so we can proceed with the cracking process using &#8220;hashcat&#8221;.<\/p>\n\n\n\n<p>Using a common password dictionary, we crack the file (for this lab, we added the exact password to the rockyou.txt file).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"531\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-9-1024x531.png\" alt=\"\" class=\"wp-image-101\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-9-1024x531.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-9-300x156.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-9-768x398.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-9.png 1084w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The type of hash, defined by the parameter &#8220;-m&#8221;, is 13100, according to the documentation found in the next link:<\/p>\n\n\n\n<p><a href=\"https:\/\/hashcat.net\/wiki\/doku.php?id=example_hashes\">https:\/\/hashcat.net\/wiki\/doku.php?id=example_hashes<\/a><\/p>\n\n\n\n<p>We wait for a couple of seconds until the tool manages to crack the TGS ticket, obtaining the &#8220;Service_BD&#8221; account password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-8-1024x564.png\" alt=\"\" class=\"wp-image-100\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-8-1024x564.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-8-300x165.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-8-768x423.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-8.png 1455w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Judging by the name and the SPN ticket information, the account is most likely associated with a database, so we can validate our access to one of the live servers we found during recon.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image_2022-06-06_003254461-1024x307.png\" alt=\"\" class=\"wp-image-99\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image_2022-06-06_003254461-1024x307.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image_2022-06-06_003254461-300x90.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image_2022-06-06_003254461-768x230.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image_2022-06-06_003254461.png 1352w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>This way, we confirm we have administrative access to the &#8220;DB01&#8221; server, so we can proceed with credential harvesting and lateral movement tasks.<\/p>\n\n\n\n<p><strong>Note:<\/strong> The capability to query for the registered SPN tickets using a low privileged account is not considered a vulnerability, since it&#8217;s the normal Active Directory behaviour. The associated vulnerabilities are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Weak passwords.<\/li>\n\n\n\n<li>The service user has excessive privileges over internal hosts.<\/li>\n\n\n\n<li>There are registered SPN tickets associated with the domain admin and other privileged users.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Disabled Kerberos Pre-authentication.<\/h2>\n\n\n\n<p>There is the possibility of configuring the Kerberos service so that, for a specific account, pre-authentication is not required before generating the TGS for the respective user. If this were the case, an attacker could request a user&#8217;s ticket without needing to know his password, and then try to crack it, potentially gaining control over the respective account.<\/p>\n\n\n\n<p>To configure this scenario in our laboratory, we can perform the following steps.<\/p>\n\n\n\n<p>We access the domain controller, the we go to the Active Directory users and computers utility.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"608\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-10-1024x608.png\" alt=\"\" class=\"wp-image-103\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-10-1024x608.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-10-300x178.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-10-768x456.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-10-1536x912.png 1536w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-10.png 1606w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We select the account which we want to be vulnerable to this attack, in my case, &#8220;Service_BD&#8221;, then right and access the &#8220;Properties&#8221; tab.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"836\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-11-1024x836.png\" alt=\"\" class=\"wp-image-104\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-11-1024x836.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-11-300x245.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-11-768x627.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-11.png 1102w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Moving into the &#8220;Account&#8221; tab, we identify the &#8220;Do not require Kerberos preauthentication&#8221; checkbox and we enable it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"751\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-12-1024x751.png\" alt=\"\" class=\"wp-image-105\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-12-1024x751.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-12-300x220.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-12-768x563.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-12.png 1146w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>During a pentest, we can obtain a list of all the users that have this flag set and therefore are vulnerable to AS-REP roasting by exploring the &#8220;ldapdomaindump&#8221; tool results.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"421\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-13-1024x421.png\" alt=\"\" class=\"wp-image-106\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-13-1024x421.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-13-300x123.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-13-768x316.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-13.png 1456w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>As an example, the image shows a previous Active Directory dump, where we can find the property &#8220;DONT_REQ_PREAUTH&#8221; on the &#8220;Flags&#8221; tab for the users &#8220;jseclow&#8221; y &#8220;jsec&#8221;.<\/p>\n\n\n\n<p>With the knowledge of the vulnerable accounts, we continue with the exploitation using the &#8220;impacket suite&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"703\" height=\"466\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-14.png\" alt=\"\" class=\"wp-image-107\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-14.png 703w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-14-300x199.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-14-700x465.png 700w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/figure>\n\n\n\n<p>By doing this, we&#8217;ll get asked for the users&#8217;s password, however, we can just hit enter and we&#8217;ll still get the TGT because of the set flag.<\/p>\n\n\n\n<p>For the &#8220;jsec&#8221; and &#8220;jseclow&#8221; users, the password is expired, so we can&#8217;t use these accounts, since we won&#8217;t get the TGT, however, for the &#8220;Service_BD&#8221; account, we got the hash, so we&#8217;re going to crack it using &#8220;hashcat&#8221;.<\/p>\n\n\n\n<p>To identify which hash type value we need to use, we can analyze the help menu and grep for REP, to identify the correct value for an AS-REP roasting.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1005\" height=\"113\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-16.png\" alt=\"\" class=\"wp-image-109\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-16.png 1005w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-16-300x34.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-16-768x86.png 768w\" sizes=\"auto, (max-width: 1005px) 100vw, 1005px\" \/><\/figure>\n\n\n\n<p>We execute &#8220;hashcat&#8221; to crack the obtained TGT.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"407\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-17-1024x407.png\" alt=\"\" class=\"wp-image-110\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-17-1024x407.png 1024w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-17-300x119.png 300w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-17-768x305.png 768w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-17.png 1078w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After a couple of seconds, we get the password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"686\" height=\"425\" src=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-18.png\" alt=\"\" class=\"wp-image-111\" srcset=\"https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-18.png 686w, https:\/\/jsec-rt.com\/wp-content\/uploads\/2022\/06\/image-18-300x186.png 300w\" sizes=\"auto, (max-width: 686px) 100vw, 686px\" \/><\/figure>\n\n\n\n<p>From this point onward, we can continue with credential harvesting and lateral movement for domain escalation.<\/p>\n\n\n\n<p>These are some common attacks that I found pretty successful on a lot of corporate environments, using dictionary and ruleset cracking, where I add new possible passwords associated to the specific entity I&#8217;m evaluating.<\/p>\n\n\n\n<p>The second part of this post will be mostly focused on lateral movement and post exploitation techniques, such as Pass-the-ticket and Golden tickets usage for persistence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An important part of the authentication mechanisms and protocols used by Active Directory is Kerberos, which in short, establishes a secure authentication channel between trusted hosts on an untrusted network. Some of the objectives of a Kerberos authentication process are listed in the following section As an attacker, we can <a href=\"https:\/\/jsec-rt.com\/index.php\/en\/2024\/03\/23\/rt-ataques-conocidos-sobre-kerberos-parte-1-2\/\" class=\"btn-link\">Continue Reading<i class=\"ion-ios-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[28,30],"class_list":["post-392","post","type-post","status-publish","format-standard","hentry","category-p-rt-en","tag-english","tag-rt"],"_links":{"self":[{"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/posts\/392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":2,"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/posts\/392\/revisions"}],"predecessor-version":[{"id":405,"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/posts\/392\/revisions\/405"}],"wp:attachment":[{"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/media?parent=392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/categories?post=392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jsec-rt.com\/index.php\/wp-json\/wp\/v2\/tags?post=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}