Kerberos Fundamentals
Deep-dive into the Kerberos protocol and study how it works under-the-hood.
This course is intended for those who are looking to build their foundational knowledge of Kerberos and Kerberos abuse primitives.
Capture, decrypt, and analyse Kerberos traffic in Wireshark.
Understand the end-to-end authentication flow in a Windows domain.
Study how attacks such as roasting and forgery are performed.
Introduction
FREE PREVIEWHow to use this course
Before we begin...
A Brief History of Kerberos
Kerberos Terminology
Authentication Overview
Wireshark
Authentication Service Exchange
FREE PREVIEWTicket-Granting Service Exchange
Client/Server Authentication Exchange
Checkpoint
ASREPRoasting
FREE PREVIEWKerberoasting
Unconstrained Delegation
FREE PREVIEWConstrained Delegation
Resource-Based Constrained Delegation
Checkpoint
Unconstrained
Constrained
Alternate Service Name
FREE PREVIEWRBCD
Sensitive Accounts
Silver Tickets
Golden Tickets