×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Kerberos Decryption

December 17, 2019

In most organizations, it is common to find anti-virus installed in order to prevent virus and malicious software from running and IDS\IPS\Firewall installed in order to identify attacks and exploits while Kerberos and encapsulated sub protocols within are being neglected. The reason sub-protocols receive no attention is because the data is inaccessible. In this paper we will unveil the potential risk hiding in hidden parts of Kerberos using decryption to bridge the gap between attackers and the defenders, providing a real view into active attacks that leverage Kerberos as a means to conceal malicious activity and lateral movement.

Previous Flipbook
Predicting Risk: Credential Theft Foresight
Predicting Risk: Credential Theft Foresight

This whitepaper examines the research behind credential theft precognition, and how it’s a significant defe...

Next Flipbook
Pass the hash detection using Windows Events
Pass the hash detection using Windows Events

Pass-the-Hash attacks allow malicious actors to move laterally in the environment without the need for user...