Kerberos Authentication
Credit: Michael Buckbee

Kerberos Authentication

What is Kerberos?

Kerberos authentication is currently the default authorization technology used by Microsoft Windows, and implementations of Kerberos exist in Apple OS, FreeBSD, UNIX, and Linux.

Microsoft introduced their version of Kerberos in Windows2000. It has also become a standard for websites and Single-Sign-On implementations across platforms. The?Kerberos Consortium?maintains Kerberos as an?open-source project.

Kerberos is a vast improvement on previous authorization technologies. The strong cryptography and third-party ticket authorization make it much more difficult for cybercriminals to infiltrate your network. It is not totally without flaws, and in order to defend against those flaws, you need to first understand them.

Kerberos has made the internet and its denizens more secure, and enables users to do more work on the Internet and in the office without compromising safety.


What is the difference between Kerberos and NTLM?

Before Kerberos, Microsoft used an authentication technology called?NTLM. NTLM stands for NT Lan Manager and is a?challenge-response authentication protocol. The target computer or domain controller challenge and check the password, and store password hashes for continued use.

The biggest difference between the two systems is the third-party verification and stronger encryption capability in Kerberos. This extra step in the process provides a significant additional layer of security over NTLM.

NTLM systems can get hacked in a matter of hours these days: it’s simply older technology, and you shouldn’t rely upon NTLM to protect sensitive data.


How do you authenticate with Kerberos?


Here are the most basic steps taken to authenticate in a Kerberized environment.

  1. Client requests an authentication ticket (TGT) from the Key Distribution Center (KDC)
  2. The KDC verifies the credentials and sends back an encrypted TGT and session key
  3. The TGT is encrypted using the Ticket Granting Service (TGS) secret key
  4. The client stores the TGT and when it expires the local session manager will request another TGT (this process is transparent to the user)

If the Client is requesting access to a service or other resource on the network, this is the process:

  1. The client sends the current TGT to the TGS with the Service Principal Name (SPN) of the resource the client wants to access
  2. The KDC verifies the TGT of the user and that the user has access to the service
  3. TGS sends a valid session key for the service to the client
  4. Client forwards the session key to the service to prove the user has access, and the service grants access.


Can Kerberos Be Hacked?

Yes. Because it is one of the most widely used authentication protocols, hackers have developed several ways to crack into Kerberos. Most of these hacks take advantage of a vulnerability, weak passwords, or malware – sometimes a combination of all three. Some of the more successful methods of hacking Kerberos include:

  • Pass-the-ticket: the process of forging a session key and presenting that forgery to the resource as credentials
  • Golden Ticket:?A ticket that grants a user domain admin access
  • Silver Ticket:?A forged ticket that grants access to a service
  • Credential stuffing/ Brute force: automated continued attempts to guess a password
  • Encryption downgrade with Skeleton Key Malware: A malware that can bypass Kerberos, but the attack must have Admin access
  • DCShadow attack: a new attack where attackers gain enough access inside a network to set up their own DC to use in further infiltration

Is Kerberos Obsolete?

Kerberos is far from obsolete and has proven itself an adequate security-access control protocol, despite attackers’ ability to crack it. The primary advantage of Kerberos is the ability to use strong encryption algorithms to protect passwords and authentication tickets. With today’s computers, any brute force attack of the AES encryption protocol used by the current version of Kerberos will take approximately longer than this solar system has left to survive. Suffice to say: Kerberos is going to be around for a while in one form or another.

What is going to replace Kerberos?

There are no real contenders to replace Kerberos in the pipeline. Most of the advancements in security are to protect your password or provide a different method of validating who you are to Kerberos. Kerberos is still the back-end technology. Kerberos excels at Single-Sign-On (SSO), which makes it much more usable in a modern internet based and connected workplace. With SSO you prove your identity once to Kerberos, and then Kerberos passes your TGT to other services or machines as proof of your identity.

The weakest link in the Kerberos chain is the password. Passwords can be brute-force cracked or stolen by?phishing attacks. For this reason,?Multi-Factor Authentication?(MFA) is becoming more popular to protect online identities. With MFA, you need the password and something else – a randomized token, mobile phone, email, thumbprint, retina scan, facial recognition, etc. – to prove that you are in fact who you are telling Kerberos you are.


Credit: Michael Buckbee








要查看或添加评论,请登录

Mehedi Hasan Babu的更多文章

  • Linux package management: apt & dpkg

    Linux package management: apt & dpkg

    APT is a front-end to dpkg that is more user-friendly than the earlier select front-end. While dpkg handles individual…

  • ISC2 Certified in Cybersecurity (CC)

    ISC2 Certified in Cybersecurity (CC)

    Certified in Cybersecurity (CC) This entry-level certification will prove to employers you have the foundational…

    12 条评论
  • Important Network Penetration Testing Checklist

    Important Network Penetration Testing Checklist

    Network Penetration Testing checklist determines vulnerabilities in the network posture by discovering Open ports…

    1 条评论
  • Difference Between Ethical Hacking and Penetration Testing

    Difference Between Ethical Hacking and Penetration Testing

    Ethical hacker and penetration tester are both important roles in the cybersecurity domain, but some confusion exists…

    2 条评论
  • Network Basics with PowerCert Animated Videos

    Network Basics with PowerCert Animated Videos

    Scott, also known as PowerCert Animated Videos, is an educational YouTuber meant to educate all things technology, such…

    1 条评论
  • Penetration Testing with Kali Linux [Boxes]

    Penetration Testing with Kali Linux [Boxes]

    The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or…

  • Vulnerable Lab Lists for Pentesting

    Vulnerable Lab Lists for Pentesting

    Vulnerability identification (testing) The objective of this step is to draft a comprehensive list of an application's…

    1 条评论
  • Update & Upgrade Kali Linux

    Update & Upgrade Kali Linux

    Updating Linux OS is essential. Specially for latest and cooler applications to run.

    7 条评论
  • ?? Email Analysis Tools ??

    ?? Email Analysis Tools ??

    ?? 1-Email Header Analysis >> ~MXToolbox: https://lnkd.in/gxaGmWcg ~MailHeader: https://mailheader.

  • ??? Red Team Tools ???

    ??? Red Team Tools ???

    ??? Red Team Tools ??? ?? RECONNAISSANCE: - RustScan ==> https://lnkd.in/ebvRfBNy - NmapAutomator ==> https://lnkd.

社区洞察

其他会员也浏览了