Top
Best
New

Posted by feross 3 days ago

Kerberoasting(blog.cryptographyengineering.com)
202 points | 69 commentspage 2
moomin 3 days ago|
Padme: AD uses salts in its protocol, right?
timmedin 2 days ago|
In Kerberos, the answer is effectively no. To generate the NT hash, the password is hashed using a single round of MD4. This is what is used to encrypt (and sign) tickets.

The attack is, guess a password, hash it, and attempt to decrypt.

With AES Kerberos keys there is a salt... but not a good one. It is just the domain (realm) and the username.

dec1m0s 3 days ago||
See also https://blog.compass-security.com/2025/09/taming-the-three-h... for an in-depth video series on Kerberos.
jabl 3 days ago|
Or the evergreen(?) https://web.mit.edu/kerberos/www/dialogue.html
worik 3 days ago||
This makes me so mad. 5he excuses from Microsoft are quite pathetic

Their ubiquitous systems have been notoriously insecure for decades.

They are one of the highest revenue firms on the planet.

It is going to take strict liability for software developers before we all pull up our socks and put an end to this nonsense. When it is a marketing advantage to produce insecure software, what else can fix our industry?

I despair

worik 3 days ago||
This makes me so mad. 5he excuses from Microsoft are quite pathetic

Their ubiquitous systems have been notoriously insecure for decades.

They are one of the highest revenue firms on the planet.

It is going to take strict liability for software developers before we all pull up oursocks and put an end to this nonsense. When it is a marketing advantage to produce insecure software, what else can fix our industry?

I despair

MrBuddyCasino 3 days ago|
A well written, easy to understand article on cryptography that isn’t using unnecessary jargon.

Did he not get the memo that this is not allowed?