All posts by Blogger

Home Articles posted by Blogger
kerberoasting

Roasting The Three-Headed Dog

When users access computer systems, they do so by entering a password. The challenge with this authentication method is that if someone maliciously obtains the password, he can take on the user’s identity and gain access to an organization’s network. Organizations need a better way to protect th...
kerberos constrained-delegation

Kerberos Constrained Delegation

Let us break down, arguably the most complex of the three delegation type attacks. Constrained delegation allows you to configure which services an account can delegate to, which can possibly limit the potential exposure if a compromise occurred When constrained delegation is set on an account: Does...