8 - Persistence
Last updated
Last updated
aa
bb
cc
dd
ee
Remembering that the Kerberos protocol uses tickets such as TGT and TGS in its key exchange flow, the're some attacks known as forging attacks based of forging malicious tickets used to impersonate users for accessing services within the domain.
There're many different types of forging attacks, such as:
Sapphire Ticket Attack
They permit to obtain persistence to the system.
Never use tools and techniques on real IP addresses, hosts or networks without proper authorization!❗