April 23, 2023, 6:36 a.m. | Jai Gupta

InfoSec Write-ups - Medium infosecwriteups.com

Authentication plays a critical role in the security of any system as it prevents unauthorized access and misuse of resources, and it is especially important in Pentesting. In Windows Environments & Active Directory, several authentication methods are available, each with its strengths and weaknesses.

In this blog post, we will examine the two most commonly used authentication protocols — NTLM and Kerberos.

We will explore various methods to exploit these authentication mechanisms in future blog posts. So let’s dive in …

access active directory amp authentication authentication methods authentication protocols blog blog post blog posts critical directory dive environments exploit future important kerberos lan manager ntlm oscp pentesting protocol protocols resources role security system unauthorized access understanding windows

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC