penetrationtesting Kerberos III - User Impersonation The goal of this post, whether we are adversaries or defenders, is to help us understand the multiple ways that Kerberos offers to access resources using the credential material gathered.
penetrationtesting Kerberos II - Credential Access In this part of the series, we will focus on Credential Access and the attacks that Kerberos can facilitate.
penetrationtesting Kerberos I - Overview This post, is the first in the series and will aim to provide an overview of the protocol, from its beginnings to the different (ab)use techniques.