Home / Blog List Layout

Blog List Layout

January, 2018

  • 10 January

    Kerberos: Cracking Kerberos

    Kerberos: Cracking Kerberos

    Kerberos: On the Microsoft platform, version 5 of the Kerberos authentication protocol has been in use since Windows 2000. The protocol offers a robust authentication framework through the use of strong cryptographic mechanism such as symmetric key cryptography. It provides mutual authentication of client and server.   The Kerberos protocol …

November, 2017

  • 19 November

    Microsoft Windows 10 vs. Apple Mac OS X

    Microsoft Windows: Although there are many different operating systems, in all likelihood it will be a flavor of Microsoft’s Windows OS that you will test against. There is other Oss in the wild that have a certain amount of enterprise market presence, but Microsoft was the installed OS of choice …

  • 9 November

    Session Hijacking and Web Apps

    Session Hijacking and Web Apps: Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the victim. Essentially, a session ID is an identifier the “conversation” it is having with the client. So, for example, say that you have logged in …