Detecting the Risk Obscured in Hidden Parts of Kerberos

Logo
Presented by

Nathaniel Ford, Moderator, (ISC)² EMEA, Ido Hoorvitch, Security Research, CyberArk Labs

About this talk

As long as Kerberos communication is not being decrypted, attackers get an opportunity to act freely using Kerberos without being detected because the encryption is being handed to them on a silver platter. Because Microsoft’s native software uses Kerberos, once control over a computer in a network is obtained, attackers can hide their activities and easily blend into a detection-less highway. Attend this webinar presented by the CyberArk Labs team to learn how decrypting the Kerberos protocol can bridge the gap between attackers and the defensive side by providing the defenders a real view over the network. We’ll discuss: •Why SIEM solutions are blind to this attack maneuver •Kerberos basics •Kerberos attacks overview •Kerberos attacks detection – considerations and limitations •Decryption – exposing the attack Speakers: Ido Hoorvitch Lavi Lazarovitz
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (392)
Subscribers (92321)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs