Exploiting Kerberos RC4 Vulnerabilities to Spoof Windows PACs πŸ›‘οΈ

Discover how to break Kerberos' RC4 encryption and manipulate Windows Privilege Attribute Certificates (PACs). Learn about the security implications and potential attack methods against Active Directory environments.

Exploiting Kerberos RC4 Vulnerabilities to Spoof Windows PACs πŸ›‘οΈ
Black Hat
6.9K views β€’ Mar 31, 2023
Exploiting Kerberos RC4 Vulnerabilities to Spoof Windows PACs πŸ›‘οΈ

About this video

While the Active Directory implementation of Kerberos prefers to use cryptography based on AES, the deprecated Kerberos encryption type is still supported by default and widely used in practice. The property that RC4 derives its cryptographic keys from a user's NTLM hash is frequently exploited to authenticate without the original password (overpass-the-hash) or to efficiently brute-force service account passwords offline (Kerberoasting).No attacks were yet known that take advantage of the well-known weaknesses in Kerberos' RC4 implementation. Therefore I decided to take a look at this and quickly identified a relatively obvious flaw in the way it was used.However, turning this cryptographic flaw into a practical attack against Kerberos or Active Directory turned out to be far from trivial...

By: Tom Tervoort

Full Abstract and Presentation Materials:
https://www.blackhat.com/eu-22/briefings/schedule/#breaking-kerberos-rc-cipher-and-spoofing-windows-pacs-29181

Video Information

Views

6.9K

Likes

68

Duration

40:59

Published

Mar 31, 2023

User Reviews

4.3
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.