|
Kerberos is the default authentication service for Microsoft Windows domains. It is intended to be more “secure” than NTLM by using third party ticket authorization as well as stronger encryption. Even though NTLM has a lot more attack vectors to choose from, Kerberos still has a handful of underlying vulnerabilities just like NTLM that we can use to our advantage. This lab, found in the attached W2_Lab1_Attacking Kerberoast.docx file, will be related to very real-world applications and will most likely not help with any CTFs however it will give you great starting knowledge of how to escalate your privileges to a domain admin by attacking Kerberos and allow you to take over and control a network . It is important to note that Red Teaming involves more than just the technical portion, so ensure to review the attached Submission Kerberoast Lab Template.docx file before moving forward. The template also contains the objectives for the lab. Deliverables:
|
|
Week 2 Master Program TryHackMe Lab

0 comments