Can an MIT Kerberos be configured to trust AD while still having its own realm and resources?

Can Kerberos be setup in a *nix environment such that authentication happens against an LDAP store other than AD but still trust the AD domain? Use case is that we have AD in use, there’s no Kerberos for *nix, we don’t want t… Continue reading Can an MIT Kerberos be configured to trust AD while still having its own realm and resources?

PowerMemory – Exploit Windows Credentials In Memory

PowerMemory is a PowerShell based tool to exploit Windows credentials present in files and memory, it levers Microsoft signed binaries to hack Windows. The method is totally new. It proves that it can be extremely easy to get credentials or any other i… Continue reading PowerMemory – Exploit Windows Credentials In Memory

In the Kerberos protocol, what prevents clients from decrypting a service’s secret key?

I’m studying the Kerberos protocol at a high level of abstraction. As I understand it- when a client wants to request a service, it first receives two messages from the TGS.

A: encrypted with the TGS/service long-term share… Continue reading In the Kerberos protocol, what prevents clients from decrypting a service’s secret key?