In this video, I’ll be talking about kerberos authentication and how it works, then I’ll talk about kerberoasting attack.
The practical demonstration of the attack will be done in the next video!
Hope you enjoy it, Please feel free to ask any queries!
Passionate In Penetration Testing, Ethical Hacking and Information Security.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookies enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!