Password Attack on Kerberos V and Windows 2000

Posted in Internet Security Whitepapers, System Hacking

0.0/5 rating (0 votes)

Kerberos V authentication protocol is described in more detail. The Windows 2000 implementation of Kerberos V protocol requires the use of the pre-authentication data in the KRB_AS_REQ message by default, which makes it harder to implement offline password attacks. If pre-authentication is not used, anyone can make a request for a TGT and launch an offline password attack against it. The default implementation of preauthentication data cons ists of an encrypted timestamp and a cryptographic checksum created with a key derived from the user’s password.
∙:∙ If you have trouble viewing this document, please click the link below!
Password Attack on Kerberos V and Windows 2000

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.