For Microsoft's authentication mechanisms, most people only know one but not the other, because they are all based on the research results of others. If you haven't studied the principles, it is difficult to have creative ideas. In the course, we will explain and analyze the NTLM & Kerberos authentication mechanisms through practical operations, so that students can understand the relationship between authentication mechanisms and attack techniques, and further understand the key points to be aware of in defense.
1.Understanding encryption methods of SAM/SYSTEM, LM/NTLM, Net-NTLM authentication mechanisms v1/ESS, v2, and corresponding offensive and defensive tactics for NTLM.
2.Understanding NTDS.DIT/SYSTEM, AS-REQ/AS-REP, TGS-REQ/TGS-REP, AP-REQ/AP-REP, S4U2Self/S4U2Proxy, and corresponding offensive and defensive tactics for Kerberos.
Please bring your own laptop and install virtual machine software.
Experience in Windows operating system management and network packet analysis is required.
20
CYBERSEC 2023 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy .