Kerberos Decryption


In most organizations, it is common to find anti-virus installed in order to prevent virus and malicious software from running and IDS\IPS\Firewall installed in order to identify attacks and exploits while Kerberos and encapsulated sub protocols within are being neglected. The reason sub-protocols receive no attention is because the data is inaccessible. In this paper we will unveil the potential risk hiding in hidden parts of Kerberos using decryption to bridge the gap between attackers and the defenders, providing a real view into active attacks that leverage Kerberos as a means to conceal malicious activity and lateral movement.

Register to Download


Share This