Author

Vaadata Author

Browsing

What is Kerberoasting? Attack and Security Tips Explained

Kerberoasting is a common attack in Active Directory environments. It is based on a weakness in the Kerberos protocol, but its exploitation requires specific configurations.

In this article, we will explain how a kerberoasting attack works. We will also look at how to identify and exploit a vulnerable environment, as well as methods for protecting against it.

How to Detect Secrets? Tools and Techniques

Before discussing techniques and tools, it is essential to define the ‘secrets’ sought during penetration tests.

These secrets are generally private character strings which, if compromised, can be used to access a system, break encryption or forge data useful for authentication. Examples include a username and password pair, API keys, private keys or a session token that is still valid.