<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kerberos on LEIKAH</title><link>https://leikah.haoyingcao.xyz/en/tags/kerberos/</link><description>Recent content in Kerberos on LEIKAH</description><generator>Hugo</generator><language>en</language><atom:link href="https://leikah.haoyingcao.xyz/en/tags/kerberos/index.xml" rel="self" type="application/rss+xml"/><item><title>Kerberos</title><link>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/kerberos/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://leikah.haoyingcao.xyz/en/docs/active_directory/movement/kerberos/</guid><description>&lt;p&gt;Kerberos is a ticket-based network protocol that enables centralized authentication and authorization management in a network. This is the process a client goes through to access a service in a Kerberos network:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Client requests a &lt;strong&gt;Ticket Granting Ticket (TGT)&lt;/strong&gt; from the &lt;strong&gt;Auethenitcation Service (AS)&lt;/strong&gt; of the &lt;strong&gt;Key Distribution Center (KDC)&lt;/strong&gt; (AS-REQ).&lt;/li&gt;
&lt;li&gt;The KDC authenticates the client, then sends back a response (AS-REP).&lt;/li&gt;
&lt;li&gt;Client decrypts the AS-REP using the hash of their password, obtaining the TGT.&lt;/li&gt;
&lt;li&gt;Client hands the TGT to the &lt;strong&gt;Ticket Granting Service (TGS)&lt;/strong&gt; alongside the &lt;strong&gt;service principal name (SPN)&lt;/strong&gt; of the service they are attempting to access (TGS-REQ).&lt;/li&gt;
&lt;li&gt;TGS after verifying the TGT and ensure the client can access the SPN, then responds to the client&amp;rsquo;s request (TGS-REP).&lt;/li&gt;
&lt;li&gt;Client decrypts TGS-REP, obtaining the service ticket.&lt;/li&gt;
&lt;li&gt;Client hands the service ticket to the service.&lt;/li&gt;
&lt;li&gt;The service decrypts the service ticket using the password hash of its service account and verifies its content, then grants the client access.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Microsoft&amp;rsquo;s implementation of Kerberos sits at the center of Active Directory. The &lt;strong&gt;Domain Controllers (DC)&lt;/strong&gt; acts as the KDC, enabling both centralized storage of credentials as well as user privileges and permissions. At the same time, different steps within the Kerberos authentication flow can be leveraged by attackers to obtain access to accounts and services. Attackers can use responses from the KDC to crack the target&amp;rsquo;s password offline (roasting attacks), extract Kerberos tickets from compromised machines, or forge tickets to escalate their privileges.&lt;/p&gt;</description></item></channel></rss>