2021
DOI: 10.1109/access.2021.3101446
|View full text |Cite
|
Sign up to set email alerts
|

On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey

Abstract: Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of attacks it can suffer, the best way to detect them and to parameterize it to mitigate the effects of the attacks. This work analyzes the main Kerberos attacks in Active Directory Windows networks, inherent in the design of the protocol and not resolved. For each attack the objective is studied… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Te attacker used a dictionary attack, rainbow table attack, guessing attack, and spidering. Motero et al [86] utilized a practical survey to describe attacks on Kerberos authentication protocols. Te authors analyzed overpass the hash, pass the ticket, golden ticket, silver ticket, Kerberoasting, unrestricted delegation attacks, restricted delegation attacks, resource-based restricted delegation attacks, and Kerberos bronze bit attacks.…”
Section: Case Study Of Attacksmentioning
confidence: 99%
“…Te attacker used a dictionary attack, rainbow table attack, guessing attack, and spidering. Motero et al [86] utilized a practical survey to describe attacks on Kerberos authentication protocols. Te authors analyzed overpass the hash, pass the ticket, golden ticket, silver ticket, Kerberoasting, unrestricted delegation attacks, restricted delegation attacks, resource-based restricted delegation attacks, and Kerberos bronze bit attacks.…”
Section: Case Study Of Attacksmentioning
confidence: 99%
“…Attacks on AD environments typically pass by specific stages and follow a certain path. The existing research efforts aiming to illustrate AD attacks assume that exploitation has happened and the attacker has a foothold in the environment [4,15]. In this paper, we follow the same approach, and we study the attacks on AD systems after obtaining the initial foothold.…”
Section: Active Directory Attack Phasesmentioning
confidence: 99%
“…Moreover, root-level access to the KDC server provides the attacker with unrestricted access to the whole system, leading to the compromise of the entire Kerberos database. Plus, Kerberos is not SSL-based, and it does not achieve end-to-end encryption between two clients by itself, which is the basis for secure intra-domain communication [23,24].…”
mentioning
confidence: 99%