Tags » Kerberos

Windows kerberos ticket theft and exploitation on other platforms

Introduction

In the past there has been a lot of talk about pass the hash, but surprisingly little about different methods for exploiting kerberos tickets. 1,208 more words

Kerberos

IBM Connections with Exchange Back-end - Chrome and Kerberos Delegation

First of all, thanks to my new found friend Michele Buccarello who had shared this document earlier last month on some very good pointers about how to integrate Exchange with IBM Connections.   348 more words

IBM Connections

Review Brew: Hellbreak #4

Writer: Cullen Bunn

Artist: Brian Churilla

Colorist: Dave Stewart

The more you know

With Orpheus team still in Maramec, we find out things are not what they seem. 300 more words

Comic News

Tor detections jump by more than 1,000%

Vectra Networks announced the results of the second edition of its “Post-Intrusion Report”, a real-world study about threats that evade perimeter defenses and what attackers do once they get inside your network. 568 more words

Brian Pennington

P–21 days: Navigating Pluto

Continuing the countdown, focusing on optical navigation using images of Pluto and the satellites.

As of midnight this morning of June 23rd, Eastern time, we’re 25.4 million kilometers from Pluto and moving 1.2 million kilometers closer every day. 670 more words

Blog

Identity Management and Two-Factor Authentication Using One-Time Passwords

Two-factor authentication, or 2FA, is not something new. It has existed for quite some time and in different forms. What is a ‘factor’? A factor is something you have, something you know, or something you are. 1,600 more words

Red Hat Enterprise Linux

Kerberos Web Application Configuration and Federation.

I’ve spent a lot of time at a client site recently working on a large complex application migration project. In my scenario, the client is migrating applications from another domain, to their own. 2,384 more words

Application Development And Integration