Thursday , April 26 2018
Home / Masonry Layout

Masonry Layout

Kerberos: Cracking Kerberos

Kerberos: Cracking Kerberos

Kerberos: On the Microsoft platform, version 5 of the Kerberos authentication protocol has been in use since Windows 2000. The protocol offers a robust authentication framework through the use of strong cryptographic mechanism such as symmetric key cryptography. It provides mutual authentication of client and server.   The Kerberos protocol …

Read More »

Session Hijacking and Web Apps

Session Hijacking and Web Apps: Session hijacking at the application level focuses on gaining access to a host by obtaining legitimate session IDs from the victim. Essentially, a session ID is an identifier the “conversation” it is having with the client. So, for example, say that you have logged in …

Read More »