Abusing Mixed Vendor Kerberos Stacks - Exploiting Windows AD and Linux Authentication
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Learn Generative AI, Prompt Engineering, and LLMs for Free
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore security vulnerabilities in mixed Kerberos environments through this DEF CON 31 conference talk that examines the problematic relationship between Windows Active Directory and MIT/Heimdal Kerberos stacks. Learn how differences in user identification methods between Microsoft's implementation and Linux/Unix systems can be exploited for privilege escalation attacks. Discover practical demonstrations of these security weaknesses, including how Active Directory configuration flaws can be leveraged to compromise Linux-based hosts within the same realm. Get introduced to new attack techniques using an updated version of the Rubeus tool, designed specifically to exploit these cross-platform authentication vulnerabilities.
Syllabus
DEF CON 31 - A Broken Marriage Abusing Mixed Vendor Kerberos Stacks - Ceri Coburn
Taught by
DEFCONConference