Skip to content

Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.

License

Notifications You must be signed in to change notification settings

byt3n33dl3/thc-Kerbhuntr

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

68 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

_________                       ____  __.          __________.__  .__  __          
\_   ___ \____________    ____ |    |/ _|__________\______   \  | |__|/  |_________
/    \  \/\_  __ \__  \ _/ ___\|      <_/ __ \_  __ \    |  _/  | |  \   __\___   /
\     \____|  | \// __ \\  \___|    |  \  ___/|  | \/    |   \  |_|  ||  |  /    / 
 \______  /|__|  (____  /\___  >____|__ \___  >__|  |______  /____/__||__| /_____ \
        \/            \/     \/        \/   \/             \/                    \/
v2

C R A C K E R B L I T Z

CracKerBlitz for roasting, Bellaros for ( lib )

Abusive and aggressive ( Kerberos ) attack

Opsec Notes

This section covers some notes on the operational security of using Bellaros in an environment, with some technical examples comparing/contrasting some of its approaches. The material here will be expanded in the future.

thanks to ( Rubeus ) and several roasting scripts.