SlideShare a Scribd company logo
Kerberos Explained
DOTAN PATRICH
Who's on First?
How can Abbot authenticate that Costello is talking?
How can Abbot make sure that Costello is on First?
Kerberos the three-headed dog
Authentication protocol named after a mythical three-headed dog:
◦ Key Distribution Center (KDC)
◦ The client user
◦ The accessed server
Came out of MIT
Adopted by MS AD to replace NTLM (and failed to do so)
How does it work?
How does it work?
User login by entering
username and password
How does it work?
How does it work?
KDC contacts AD to authenticate
the user and gather all
groups he posses
How does it work?
How does it work?
Windows Security Event
4768 event logged for the
user from source ip
How does it work?
Windows Security Event
4768 event logged for the
user from source ip
Client machine caches the TGT
This is done once per session (until TGT expiration)
How does it work?
Now the user wants to access server B
How does it work?
How does it work?
KDC validate the request
(check encryption validity)
How does it work?
How does it work?
Windows Security Event
4769 event logged for the
user from source ip to
computer B
How does it work?
How does it work?
Validate the ticket authenticity:
decrypt the service ticket with
computer B ticket
So what’s new?
Scalable
◦ Servers do not need to contact KDC to authenticate users
◦ Only users and machine account authenticate with the KDC, once per 10h of activity
Secure
◦ Passwords are not sent over the wire
◦ Ticket based authentication based on certificates trusts
Advanced Features
◦ Single Sign-On
◦ Delegation
◦ Cross Domain Authentication
Wait, machines need to authenticate?
Yes!!
◦ Need to ensure that a Service Ticket is addressed and used only by the destination computer
◦ The Service Ticket is encrypted by the machine account session key (shared with the KDC)
◦ Only the target machine can validate the Service Ticket
◦ This is why we see 4768 events and 4769 events for the machine account!
4769 events with source=target
When a user logins to a local computer, a session is created for him:
◦ It doesn’t matter if it is a remote session, or local interactive session
◦ In both cases, the computer needs to know the user’s credentials (group membership and SID)
◦ It uses a Service Ticket addressed to the local computer to do so
◦ Works the same as if we contacted a remote servers
◦ This is why we get a 4769 event with source equals to target after each login
4769 with target equals domain controller?
After each login, the computer needs to pull Group Policy from AD:
◦ Need to access the AD domain controller and pull the policy
◦ To do so, we need to authenticate with the domain controller
◦ Authentication is done using Kerberos, just like any server access
◦ This is why we get a 4769 event with target equals to a domain controller after each login
So, what events are logged ?
Event Type Account Source Destination
4768 Machine B Machine B
4768 Machine C Machine C
4768 User A Machine B
4769 User A Machine B Machine B
4769 User A Machine B Domain Controller
4769 User A Machine B Machine C
Time
Delegation
A mechanism to authenticate on behalf of the user to 3rd party resources
Machine and account doing the delegation need to be trusted by AD
Used by most Windows based web servers (i.e. SharePoint, Sites backed by SQL Server)
User authenticate with
the web server
Service Ticket passed to the SQL server
Source ip is the web server!
4769 event logged, with
delegated flag set to true
(ticket options field)
Cross Domain Authentication
◦ The client first authenticate with the local domain, asking for a referral ticket
◦ The referral ticket is encrypted by a inter-domain key
◦ The client sends the referral ticket to the remote domain
◦ The remote domain issues a Service Ticket granting access to the remote server
Interesting Windows Security Events

More Related Content

PPTX
Kerberos Authentication Protocol
PPTX
Kerberos protocol
PPTX
Kerberos
PDF
Kerberos
PPTX
Kerberos
PPT
Email Security : PGP & SMIME
PPTX
Trusted Platform Module (TPM)
PDF
Block Ciphers and the Data Encryption Standard
Kerberos Authentication Protocol
Kerberos protocol
Kerberos
Kerberos
Kerberos
Email Security : PGP & SMIME
Trusted Platform Module (TPM)
Block Ciphers and the Data Encryption Standard

What's hot (20)

PPTX
Kerberos
PDF
Nmap basics
PPTX
Abusing Microsoft Kerberos - Sorry you guys don't get it
PPT
Fundamentals of cryptography
PPTX
Cryptography
PPTX
Cryptography.ppt
PDF
0wn-premises: Bypassing Microsoft Defender for Identity
PPTX
Cryptography and Information Security
PPT
Cryptography
PPTX
Catch Me If You Can: PowerShell Red vs Blue
PPTX
Public-Key Cryptography.pptx
PDF
Harnessing the Power of AI in AWS Pentesting.pdf
PPTX
Kerberos authentication
PPTX
Kerberos
PPTX
Public Key Cryptography
PPTX
RSA Algorithm
PPTX
Understanding NMAP
PPT
Design and Simulation Triple-DES
PPTX
Block Cipher and Operation Modes
PPTX
Diffie Hellman Key Exchange
Kerberos
Nmap basics
Abusing Microsoft Kerberos - Sorry you guys don't get it
Fundamentals of cryptography
Cryptography
Cryptography.ppt
0wn-premises: Bypassing Microsoft Defender for Identity
Cryptography and Information Security
Cryptography
Catch Me If You Can: PowerShell Red vs Blue
Public-Key Cryptography.pptx
Harnessing the Power of AI in AWS Pentesting.pdf
Kerberos authentication
Kerberos
Public Key Cryptography
RSA Algorithm
Understanding NMAP
Design and Simulation Triple-DES
Block Cipher and Operation Modes
Diffie Hellman Key Exchange
Ad

Viewers also liked (16)

PPTX
Kerberos : An Authentication Application
PPTX
kerberos
PDF
Kerberos presentation
RTF
Kerberos case study
PPT
Kerberos
PPTX
Kerberos survival guide-STL 2015
PPTX
Golden ticket, pass the ticket mi tm kerberos attacks explained
PPTX
PPTX
Kerberos, Token and Hadoop
PDF
IDS/IPS security
PDF
An Introduction to Kerberos
PPTX
Introduction to IDS & IPS - Part 1
PPTX
Snort IDS/IPS Basics
PDF
Kerberos Protocol
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPT
IDS and IPS
Kerberos : An Authentication Application
kerberos
Kerberos presentation
Kerberos case study
Kerberos
Kerberos survival guide-STL 2015
Golden ticket, pass the ticket mi tm kerberos attacks explained
Kerberos, Token and Hadoop
IDS/IPS security
An Introduction to Kerberos
Introduction to IDS & IPS - Part 1
Snort IDS/IPS Basics
Kerberos Protocol
Computer Security and Intrusion Detection(IDS/IPS)
IDS and IPS
Ad

Similar to Kerberos explained (20)

PDF
Active Directory Golden Ticket Attack Detection
PDF
Kerberos survival guide
PDF
Null talk
PPTX
Kerberos survival guide SPS Kansas City
PDF
Kerberos Survival Guide - St. Louis Day of .Net
PPTX
Kerberos Survival Guide: SharePointalooza
PPTX
Kerberos Survival Guide: Columbus 2015
PPTX
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
PPTX
SPS Ozarks 2012: Kerberos Survival Guide
PPTX
SharePoint Saturday Kansas City - Kerberos Survival Guide
PDF
Technet.microsoft.com
PPTX
UTD Computer Security Group - Cracking the domain
PPTX
Kerberos survival guide - SPS Ozarks 2010
PPTX
Rakesh raj
PPTX
Kerberos Survival Guide SPS Chicago
PPTX
Kerberos Authentication Process In Windows
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
Active Directory Golden Ticket Attack Detection
Kerberos survival guide
Null talk
Kerberos survival guide SPS Kansas City
Kerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
SPS Ozarks 2012: Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival Guide
Technet.microsoft.com
UTD Computer Security Group - Cracking the domain
Kerberos survival guide - SPS Ozarks 2010
Rakesh raj
Kerberos Survival Guide SPS Chicago
Kerberos Authentication Process In Windows
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication

Recently uploaded (20)

PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Cost to Outsource Software Development in 2025
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
medical staffing services at VALiNTRY
PDF
Understanding Forklifts - TECH EHS Solution
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
L1 - Introduction to python Backend.pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Transform Your Business with a Software ERP System
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
assetexplorer- product-overview - presentation
PDF
Nekopoi APK 2025 free lastest update
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Which alternative to Crystal Reports is best for small or large businesses.pdf
Cost to Outsource Software Development in 2025
Softaken Excel to vCard Converter Software.pdf
medical staffing services at VALiNTRY
Understanding Forklifts - TECH EHS Solution
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PTS Company Brochure 2025 (1).pdf.......
L1 - Introduction to python Backend.pptx
Design an Analysis of Algorithms II-SECS-1021-03
Digital Systems & Binary Numbers (comprehensive )
Designing Intelligence for the Shop Floor.pdf
iTop VPN Free 5.6.0.5262 Crack latest version 2025
Odoo Companies in India – Driving Business Transformation.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Transform Your Business with a Software ERP System
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
assetexplorer- product-overview - presentation
Nekopoi APK 2025 free lastest update

Kerberos explained

  • 2. Who's on First? How can Abbot authenticate that Costello is talking? How can Abbot make sure that Costello is on First?
  • 3. Kerberos the three-headed dog Authentication protocol named after a mythical three-headed dog: ◦ Key Distribution Center (KDC) ◦ The client user ◦ The accessed server Came out of MIT Adopted by MS AD to replace NTLM (and failed to do so)
  • 4. How does it work?
  • 5. How does it work? User login by entering username and password
  • 6. How does it work?
  • 7. How does it work? KDC contacts AD to authenticate the user and gather all groups he posses
  • 8. How does it work?
  • 9. How does it work? Windows Security Event 4768 event logged for the user from source ip
  • 10. How does it work? Windows Security Event 4768 event logged for the user from source ip Client machine caches the TGT This is done once per session (until TGT expiration)
  • 11. How does it work? Now the user wants to access server B
  • 12. How does it work?
  • 13. How does it work? KDC validate the request (check encryption validity)
  • 14. How does it work?
  • 15. How does it work? Windows Security Event 4769 event logged for the user from source ip to computer B
  • 16. How does it work?
  • 17. How does it work? Validate the ticket authenticity: decrypt the service ticket with computer B ticket
  • 18. So what’s new? Scalable ◦ Servers do not need to contact KDC to authenticate users ◦ Only users and machine account authenticate with the KDC, once per 10h of activity Secure ◦ Passwords are not sent over the wire ◦ Ticket based authentication based on certificates trusts Advanced Features ◦ Single Sign-On ◦ Delegation ◦ Cross Domain Authentication
  • 19. Wait, machines need to authenticate? Yes!! ◦ Need to ensure that a Service Ticket is addressed and used only by the destination computer ◦ The Service Ticket is encrypted by the machine account session key (shared with the KDC) ◦ Only the target machine can validate the Service Ticket ◦ This is why we see 4768 events and 4769 events for the machine account!
  • 20. 4769 events with source=target When a user logins to a local computer, a session is created for him: ◦ It doesn’t matter if it is a remote session, or local interactive session ◦ In both cases, the computer needs to know the user’s credentials (group membership and SID) ◦ It uses a Service Ticket addressed to the local computer to do so ◦ Works the same as if we contacted a remote servers ◦ This is why we get a 4769 event with source equals to target after each login
  • 21. 4769 with target equals domain controller? After each login, the computer needs to pull Group Policy from AD: ◦ Need to access the AD domain controller and pull the policy ◦ To do so, we need to authenticate with the domain controller ◦ Authentication is done using Kerberos, just like any server access ◦ This is why we get a 4769 event with target equals to a domain controller after each login
  • 22. So, what events are logged ? Event Type Account Source Destination 4768 Machine B Machine B 4768 Machine C Machine C 4768 User A Machine B 4769 User A Machine B Machine B 4769 User A Machine B Domain Controller 4769 User A Machine B Machine C Time
  • 23. Delegation A mechanism to authenticate on behalf of the user to 3rd party resources Machine and account doing the delegation need to be trusted by AD Used by most Windows based web servers (i.e. SharePoint, Sites backed by SQL Server) User authenticate with the web server Service Ticket passed to the SQL server Source ip is the web server! 4769 event logged, with delegated flag set to true (ticket options field)
  • 24. Cross Domain Authentication ◦ The client first authenticate with the local domain, asking for a referral ticket ◦ The referral ticket is encrypted by a inter-domain key ◦ The client sends the referral ticket to the remote domain ◦ The remote domain issues a Service Ticket granting access to the remote server