• Home
  • Blog
  • Week 2 Master Program TryHackMe Lab

Week 2 Master Program TryHackMe Lab

0 comments

arrow collapseHide Assignment Information

Kerberos is the default authentication service for Microsoft Windows domains. It is intended to be more “secure” than NTLM by using third party ticket authorization as well as stronger encryption. Even though NTLM has a lot more attack vectors to choose from, Kerberos still has a handful of underlying vulnerabilities just like NTLM that we can use to our advantage.

This lab, found in the attached W2_Lab1_Attacking Kerberoast.docx file, will be related to very real-world applications and will most likely not help with any CTFs however it will give you great starting knowledge of how to escalate your privileges to a domain admin by attacking Kerberos and allow you to take over and control a network . It is important to note that Red Teaming involves more than just the technical portion, so ensure to review the attached Submission Kerberoast Lab Template.docx file before moving forward. The template also contains the objectives for the lab.

Deliverables:

  • Complete the W2_Lab1_Attacking Kerberoast lab (remember to use the Sumission Kerberoast Lab Template along the way!).

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}