6 Ways Data Breaches Can Strike Your Brand Value

Introduction Data breaches have become a significant concern for organizations across industries worldwide. With more sensitive data stored and transmitted online, these security breaches have far-reaching consequences. Cyber attackers are constantly devising alternative ways to breach security protocols. As a result, it becomes crucial for companies to stay at the forefront of technology and security...

Kerberos Attacks – Part 2

In our previous blog post, we discussed the Kerberos authentication and authorization mechanism and a few of their exploits. We also discussed PAC’s significance and how it affects user authorization. In this blog, we will dive deeper into PAC exploits and how attackers can use the PAC in different ways to escalate their privileges in...

Attacking Kerberos Delegation

Kerberos Delegation is a powerful authentication mechanism that allows users and services to securely access resources in an Active Directory environment.   Topics covered:   Basic principles of Kerberos Delegation   Types of delegations, their configuration and how they work   Exploiting constrained delegation  By exploring these topics one by one in our blog, you’ll...