- Practical Network Scanning
- Ajay Singh Chauhan
- 354字
- 2022-07-12 10:43:16
Authentication NTLM versus Kerberos
NT LAN Manager (NTLM) and Kerberos are both authentication protocols that do not play any role in terms of authorization. NTLM is a proprietary authentication protocol developed by Microsoft, whereas Kerberos is a standard protocol. Starting with Win2K, Microsoft implements Kerberos as the default authentication protocol for the Windows OS. However, if the Kerberos protocol is not negotiated for some reason, then Active Directory (AD) will use LM, NTLM, or NTLM version 2 (NTLMv2).
Kerberos is a cryptographic network protocol that works for authenticating users to resources, which involves a client, server, and a Key Distribution Center (KDC). Kerberos was named after Cerberus, the three-headed dog of Greek mythology, because of its three components. KDC has two components: an Authentication Server and a Ticket Granting Service, as well as the Client and the Print Server that the Client wants to access, as shown in the following diagram:

Let's try to understand the process step by step:
- For network domain authentication, a Client provides a username and a password, which is validated by the Authentication Server, a component of KDC.
- The KDC grants a Ticket Getting Ticket (TGT) with a default duration of 10 hours.
- When the client attempts to access the Print Server in the domain, the TGT is used to make the request instead of entering credentials again and again. The Client obtains a service ticket from the Ticket Granting Server, a component of KDC.
- A service ticket is created for the Client and the Server that the Client wants to access. The service ticket consists of a ticket and a session key.
- The Client presents the service ticket to create a session with the service on the Server. The Server uses its key to decrypt the information from the TGS, and the Client is authenticated to the Server.
The major differences can be seen in the following table:

System admins need to make sure they run Kerberos by default. In any scenarios where you need to turn on NTLM, it should be used with caution, keeping risks in mind.
- CTF實戰:技術、解題與進階
- 黑客大曝光:無線網絡安全(原書第3版)
- 為你護航:網絡空間安全科普讀本(第2版)
- Practical Network Scanning
- INSTANT Burp Suite Starter
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 黑客攻防與無線安全從新手到高手(超值版)
- Kali Linux Wireless Penetration Testing Cookbook
- 數據安全與隱私計算(第3版)
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- Mastering Reverse Engineering
- 人工智能安全(精裝版)
- 數據保護:工作負載的可恢復性
- 網絡關鍵設備安全檢測實施指南
- Hands-On Artificial Intelligence for Cybersecurity