As long as Kerberos communication is not being decrypted, attackers get an opportunity to act freely using Kerberos without being detected because the encryption is being handed to them on a silver platter. Because Microsoft’s native software uses Kerberos, once control over a computer in a network is obtained, attackers can hide their activities and easily blend into a detection-less highway.
Attend this webinar presented by the CyberArk Labs team to learn how decrypting the Kerberos protocol can bridge the gap between attackers and the defensive side by providing the defenders a real view over the network.
We’ll discuss:
•Why SIEM solutions are blind to this attack maneuver
•Kerberos basics
•Kerberos attacks overview
•Kerberos attacks detection – considerations and limitations
•Decryption – exposing the attack
Speakers:
Ido Hoorvitch
Lavi Lazarovitz
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs…