Kerberos & Active Directory Attacks

Introduction

Kerberos Authentication:

AS-REQ

When a user logs onto their workstation, their machine will send an AS-REQ message to the Key Distribution Center (KDC) (Domain Controller). This message requests a TGT using a secret key derived from the user's password.

AS-REP

The KDC verifies the secret key with the password is has stored in Active Directory for that user, it returns a TGT as a AS-REP message. The TGT contains the user's identity and is encryted with the KDC secret key (the krbtgt account).

Accessing Resources:

TGS-REQ

When a user attempts to access a resource backed by Kerberos authentication, their machine looks up the associated Service Prinical Name (SPN). It then requests a Ticket Granting Service Ticket (TGS) in the form a TGS-REQ. It presents the user's TGT as a way of providing they're a valid user.

TGS-REP

The KDC returns a TGS (TGS-REP) for the service in question, which is then presented to the actual service. The service inspects the TGS and decides wheter it should grant access.

Last updated