You are on page 1of 27

NTLM

Kerberos
and
Public Key Cryptography

OZ
NTLM
NTLM - Basics

 Windows New Technology LAN Manager (NTLM) is an authentication security protocol that was created to
protect the integrity and confidentiality of user’s activity

 NTLM is a single sign on (SSO) tool that relies on a challenge-response protocol to confirm the user without
requiring them to submit a password.

 NTLM is still used to connect non-Windows devices to AD domains.


NTLM - how does it work

Application
Client DC
Server
Client passes plaintext username to server

Server replies to the client with a challenge

Client sends challenge response to the server

Server sends challenge, response and username to DC

DC compares encrypted challenge and response

Server returns DC response to client


NTLM - Vulnerabilities

 NTLM does not use salting

 Weak hashing algorithm – MD4/MD5

 MFA not supported – relayed on password only (what you know)


NTLM - Pass The Hash

This attack allows an attacker to authenticate to a system by using the hash of a user's
password, rather than the actual password.
NTLM - Recent Pass The Hash Attack

In a number recently reported incidents, a ransomware-as-a-service (RaaS) platform called


Hive leveraged Pass The Hash to advance a coordinated attack that targeted a large number of
Microsoft’s Exchange Server customers, including those in the energy, financial services,
nonprofit and healthcare sectors.
NTLM – Other Attacks

 Brute-Force Attack

 Dictionary Attack

 MITM Attack

 NTLM Relay Attack


NTLM - Mitigations and Security Measures
 Enforce a Password Policy

 Strong Passwords

 Change Frequently (up to 6 months)

 Password Manager

 Implement Access Control Policy

 Separation Of Duties 

 Least Privilege

 Update Software

 Disable Legacy Protocols

 Monitor Domain Logs


Kerberos
Kerberos - Basics

 Kerberos was developed by researchers at the Massachusetts Institute of Technology (MIT)


in the 1980s

 Like NTLM, Kerberos is an authentication protocol. It replaced NTLM as the


default/standard authentication tool on Windows 2000 and later releases.

 Kerberos uses a two-part process that leverages a ticket granting service or key
distribution center
Kerberos - How does it work

Key Distribution Center


1. Client Logon
Authentication
2. TGT Service (AS)
Client

3. TGT
Ticket Granting
Service (TGS)
4. Client to Serv
e r Ticket
Server Ticket
5. Client to

6. Allow
Access

Server/Resource
Kerberos - Vulnerabilities

 Single point of failure

 Replay attacks
Kerberos - Kerberoasting

Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to
obtain a ticket-granting service (TGS) ticket that may be vulnerable to Brute Force and other
password attack
Kerberos - Silver and Golden Ticket

 Golden Ticket attack: A golden ticket is a Kerberos ticket that has been forged to allow the
attacker to impersonate any user on the network. Golden tickets can be used to perform a
variety of attacks, such as accessing sensitive data or taking control of systems

 Silver Ticket attack: A silver ticket is a Kerberos ticket that has been forged to allow the
attacker to impersonate a service on the network. Silver tickets can be used to perform a
variety of attacks, such as bypassing security restrictions or disabling services
Kerberos - Pass The Ticket

A pass-the-ticket attack is an attack that allows an attacker to use a valid Kerberos ticket that
they have obtained from another user to authenticate to a service. Pass-the-ticket attacks can
be used to gain access to resources that the attacker would not otherwise be able to access
Kerberos - Other Attacks

q NTLM Downgrade Attack


Kerberos - Mitigations and Security Measures
Public Key
Cryptography
Public Key Cryptography - Basics

 Public Key Cryptography or Asymmetric Cryptography is a method of encrypting or signing


data with two different keys and making one of the keys, the public key, available for
anyone to use

 The other key is known as the private key is used to decrypt data that was encrypted with
the Public key

 A person cannot guess the private key based on knowing the public key

 Symmetric Cryptography as opposed to Asymmetric relies on a shared key for both


encryption and decryption
Public Key Cryptography - How Does It Work

 Each entity creates a pair of a private key and a public key

 In order to send a message, we need to encrypt it using the other entity’s public key

 It can also be used to confirm a signature signed by someone’s private key


Public Key Cryptography - Key Exchange

 After obtaining the public keys each entity can compute a shared symmetric key offline

 The symmetr
Public Key Cryptography - TLS

 TLS is an encryption and authentication protocol designed to secure Internet


communications

 The TLS handshake contains the following steps:

1. Specify which version of TLS to use

2. Decide on which cipher suites to use

3. Authenticate the identity of the server via the server’s public key and the SSL certificate authority’s
digital signature

4. Generate session keys in order to use symmetric encryption after the handshake is complete
Public Key Cryptography - Certificate Based Authentication

 Certificate-based authentication is the process of establishing your identity using


electronic documents known as digital certificates

 For certificate-based authentication to work properly, the user must have a private key
with information that corresponds to the public key in a certificate
Public Key Cryptography - Certificate Based Authentication
Questions?
Thank You

You might also like