March 31, 2023, 7:30 p.m. | Black Hat

Black Hat www.youtube.com

While the Active Directory implementation of Kerberos prefers to use cryptography based on AES, the deprecated Kerberos encryption type is still supported by default and widely used in practice. The property that RC4 derives its cryptographic keys from a user's NTLM hash is frequently exploited to authenticate without the original password (overpass-the-hash) or to efficiently brute-force service account passwords offline (Kerberoasting).No attacks were yet known that take advantage of the well-known weaknesses in Kerberos' RC4 implementation. Therefore I decided to …

account active directory aes attacks brute-force cipher cryptography default directory encryption exploited flaw hash kerberos keys ntlm password passwords practice rc4 service spoofing well-known windows

Corporate Security Specialist - 2nd shift (12pm-8pm)

@ Perrigo Company | Grand Rapids, MI, US, 49503

Lead Engineer, Network Security -Network

@ Singtel | Singapore, Singapore

DevSecOps Engineer

@ Moveworks | Remote, USA

Systems Engineer - Cyber Security

@ Penske | Tampa, FL, United States

(Senior) Security Analyst (m/f/x)

@ REWE International Dienstleistungsgesellschaft m.b.H | Wiener Neudorf, Austria

Tier 3 Analyst- Red Team

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States