Detecting Forged Kerberos Tickets in an Active Directory Environment

12/30/2022
by   Thomas Grippo, et al.
0

Active Directory is the most popular service to manage users and devices on the network. Its widespread deployment in the corporate world has made it a popular target for threat actors. While there are many attacks that target Active Directory and its authentication protocol Kerberos, ticket forgery attacks are among the most dangerous. By exploiting weaknesses in Kerberos, attackers can craft their own tickets that allow them to gain unauthorized access to services on the network. These types of attacks are both dangerous and hard to detect. They may require a powerful centralized log collecting system to analyze Windows security logs across multiple services. This would give additional visibility to be able to find these forged tickets in the network.

READ FULL TEXT

page 6

page 7

page 8

page 9

research
11/22/2017

Formal Analysis of an Authentication Protocol Against External Cloud-Based Denial-of-Service (DoS) Attack

The Denial-of-service (DoS) attack is considered one of the largest thre...
research
09/04/2018

Exploiting SNMP-MIB Data to Detect Network Anomalies using Machine Learning Techniques

The exponential increase in the number of malicious threats on computer ...
research
10/18/2022

Automatic Detection of Fake Key Attacks in Secure Messaging

Popular instant messaging applications such as WhatsApp and Signal provi...
research
02/07/2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

Ransomware has become an increasingly popular type of malware across the...
research
04/18/2018

SDN-Assisted Network-Based Mitigation of Slow DDoS Attacks

Slow-running attacks against network applications are often not easy to ...
research
05/05/2021

Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments

To address privacy problems with the EMV standard, EMVco proposed a Blin...

Please sign up or login with your details

Forgot password? Click here to reset