Kerberos Explained (Video)

Kerberos gets used a lot in Windows AD environments to authenticate users over the network, and a lot of us have attacked it with Impacket and Mimikatz etc.

But when you start to look into how it actually works, lots of articles either over simplify things or go the other way and provide too much low level technical info without any context of how that applies to real world scenarios.

So I thought I’d try and cover the authentication process in a few different levels of detail and keep it all related to real world AD scenarios.

Also made a blog post here with all of the diagrams from the video for quick reference: Kerberos Protocol Explained | VbScrub

Nice one.

Type your comment> @TazWake said:

Nice one.

Agreed :smile:

Thanks for the great content @VbScrub as always :wink:

Great! Thanks.

Thanks guys, glad you found it useful

Amazing video. Well understood. Thanks for sharing.

@JeffDgreat no problem!