
In this workshop, you’ll get an overview of Kerberos based on a section straight from Red Siege’s Offense for Defense (O4D) course and another excerpt from the new Pen Testing: Beyond the Basics class.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
In this workshop, you’ll get an overview of Kerberos based on a section straight from Red Siege’s Offense for Defense (O4D) course and another excerpt from the new Pen Testing: Beyond the Basics class.
We’ll cover what Kerberos is, and how to attack it. You’d work through a hands on lab exercise involving Kerberoasting (Tim’s baby), the silver ticket attack, and the golden ticket attack.
System Requirements
-
Student Requirements:
- Just a laptop with a browser (Safari will work, but it is not preferred)
Syllabus
-
- Examine how Active Directory and Kerberos work to provide authentication and authorization
-
- Windows Domain and Kerberos – Nearly every organization uses Active Directory (AD). No penetration testing workshop or course would be complete without a deep dive into identifying issues in AD, and abusing those issues for privilege escalation, lateral movement, and persistence.
-
- Discuss real world, high-impact attacks used by threat actors to abuse Kerberos, such as
-
- Kerberoasting
-
- Silver Ticket Attack
-
- Golden Ticket Attacks
-
- Overpass-the-Hash
-
- Pass-the-Ticket
-
- Kerberos Delegation Issues
-
- Discuss real world, high-impact attacks used by threat actors to abuse Kerberos, such as
-
- The workshop includes two hands-o
-
- Kerberoasting and Silver Ticket Attack
-
- Golden Ticket Attack
-
- The workshop includes two hands-o
FAQ
About the Instructor
Tim Medin
"Hacker, instructor, and Kerberoast Guy"Bio
Tim is the CEO and founder of Red Siege Information Security. He is the creator of the Kerberoasting. Tim was a Senior Instructor and course author (SEC560) at The SANS Institute. Tim has performed penetration tests on a wide range of organizations and technologiesTim is an experienced international speaker, having presented to organizations around the world.
Related products
-
Benjamin BowmanLive4 Hrs
Workshop: Exploiting AI with Ben Bowman
View Course This product has multiple variants. The options may be chosen on the product page -
Troy WojewodaLive4 Hrs
Workshop: Foundations of Network Forensics and Analysis with Troy Wojewoda
View Course This product has multiple variants. The options may be chosen on the product page -
Hal DentonLive4 Hrs
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive4 Hrs
Workshop: Hacking AI-LLM Applications with Brian Fehrman, Joff Thyer and Derek Banks
View Course This product has multiple variants. The options may be chosen on the product page
