Kerberos Deep Dive Part 5 - Constrained Delegation
Автор: Compass Security
Загружено: 2025-09-15
Просмотров: 531
Описание:
Constrained delegation was designed to provide a safer alternative to unconstrained delegation, but it can still be abused. We explore how attackers can exploit this delegation mechanism, and how to use monitoring and configuration best practices to minimize the risks.
The slides shown in the video can be found here: https://www.compass-security.com/de/r...
0:00 Introduction
1:31 Constrained Delegation
3:31 Modes of Operation
4:52 Configuration
8:15 Kerberos Only Mode
8:25 S4U2Proxy
15:29 Example Setup
22:58 Forwardable Tickets
33:30 Attacking Kerberos Only Mode
44:52 Protocol Transition Mode
47:38 S4U2Self
52:14 TrustedToAuthForDelegation
56:37 Example Setup
1:05:56 S42USelf for Authorization
1:08:24 Attacking Constrained Delegation Mode
1:12:15 Attacking a Machine Account
1:17:20 Attacking a User Account
1:21:18 Failure Cases
1:24:52 Recommendations
1:28:08 Service Substitution
1:34:19 Rubeus
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: