05/11 (Thu.) 09:30 - 11:30 4F 4C
Understanding NTLM & Kerberos Authentication Mechanisms from Packets (Fundamentals)

For Microsoft's authentication mechanisms, most people only know one but not the other, because they are all based on the research results of others. If you haven't studied the principles, it is difficult to have creative ideas. In the course, we will explain and analyze the NTLM & Kerberos authentication mechanisms through practical operations, so that students can understand the relationship between authentication mechanisms and attack techniques, and further understand the key points to be aware of in defense.

Session Summary

1.Understanding encryption methods of SAM/SYSTEM, LM/NTLM, Net-NTLM authentication mechanisms v1/ESS, v2, and corresponding offensive and defensive tactics for NTLM.

2.Understanding NTDS.DIT/SYSTEM, AS-REQ/AS-REP, TGS-REQ/TGS-REP, AP-REQ/AP-REP, S4U2Self/S4U2Proxy, and corresponding offensive and defensive tactics for Kerberos.

Device Requirement You Should Prepared for

Please bring your own laptop and install virtual machine software.

Skills Requirement You Should Have

Experience in Windows operating system management and network packet analysis is required.

Limit on the Number of Attendee

20

  • THEME | CyberLAB
  • LOCATION | Taipei Nangang Exhibition Center, Hall 2 4F undefined
  • LANGUAGE | Chinese