On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey

被引:10
作者
Diaz Motero, Carlos [1 ]
Bermejo Higuera, Juan Ramon [1 ]
Bermejo Higuera, Javier [1 ]
Sicilia Montalvo, Juan Antonio [1 ]
Gamez Gomez, Nadia [1 ]
机构
[1] Univ Int La Rioja, Escuela Super Ingn & Tecnol, Logrono 26006, La Rioja, Spain
关键词
Protocols; Authentication; Servers; Picture archiving and communication systems; Licenses; Encryption; Databases; Windows active directory; Kerberos; Kerberos attacks; Kerberos attack detection; Kerberos attack's mitigation;
D O I
10.1109/ACCESS.2021.3101446
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of attacks it can suffer, the best way to detect them and to parameterize it to mitigate the effects of the attacks. This work analyzes the main Kerberos attacks in Active Directory Windows networks, inherent in the design of the protocol and not resolved. For each attack the objective is studied, implementation is developed in a virtual laboratory and detection is analyzed, proposing measures for mitigation and response. Subsequently, they are discussed in a general way and the results of the attacks are analyzed according to some parameters. As conclusions of the work carried out, it should be noted that although the attacks are mostly difficult to implement, their detection is even more complicated, and the damage is very severe so it's necessary to continuously monitor the logs in these environments to detect them and taking into account strict recommendations for mitigation and response.
引用
收藏
页码:109289 / 109319
页数:31
相关论文
共 60 条
[1]  
Abdelmajid N. T., 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P1099, DOI 10.1109/SocialCom.2010.163
[2]  
Alexandrov O., 2018, WEAKNESS KERBEROS DE
[3]   Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack [J].
Anbu Malar, M. B. Benjula ;
Prabhu, J. .
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2021, 17 (01) :78-88
[4]  
Ancarani R, 2019, EXPLOITING UNCONSTRA
[5]   Strategies against replay attacks [J].
Aura, T .
10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, :59-68
[6]  
Babu M. M, 2014, I MANAGERS J CLOUD C, V1, P19, DOI [10.26634/jcc.1. 4.3191, DOI 10.26634/JCC.1.4.3191]
[7]  
Decoder's Blog, 2019, DONK GUID RES BAS CO
[8]  
Delpy B, 2014, ABUSING MICROSOFT KE
[9]  
Dua G., 2013, INT J COMPUT NETW CO, V5, P59
[10]  
Garcia C. G., 2017, 0XWORD