Kerberos, overpass the hash AS_REQ?

So based on my understanding in the pre-auth AS_REQ, the user encrypts the timestamp and sends it to the KDC. If the KDC can decrypt the timestamp then it provides the user a TGT encrypted using the KRBGT and a session key that’s encrypted.

Given kerberos is AES and RC4 (deprecated), when you do an overpass the hash attack how is the AS_REQ timestamp encrypted using an NT hash / how is the timestamp encryption derived from the users clear text password?

submitted by /u/thehunter699
[link] [comments]

August 15, 2023
Read More >>

Karnataka HC Refuses To Quash TEJAS Data Theft Case Against 27-Year-Old Aerospace Engineer

“Necessity to regulate the usage of dark web has become the need of the hour”Observing that instances of theft of secret defence data and sale of stolen data on the dark web has become worrisome for nations, the High Court of Karnataka has refused to quash a criminal case registered against an aerospace engineer for allegedly stealing sensitive data on Light Combat Aircraft (LCA) program and

August 15, 2023
Read More >>