๐Ÿ“š Module Overview

This advanced module dives deep into Kerberos authentication security, covering both attack techniques and defense strategies. You'll learn about Golden and Silver ticket attacks, Kerberoasting, delegation abuse, and advanced persistence mechanisms used by real-world threat actors.

4

Comprehensive Lessons

2

Hands-on Labs

15+

Attack Techniques

20+

Defense Strategies

๐ŸŽฏ Learning Objectives

By completing this module, you will be able to:

๐Ÿ“– Lesson Structure

๐Ÿ”‘ Lesson 1: Kerberos Protocol Fundamentals

90 minutes

Topics Covered:

  • Kerberos authentication flow
  • Ticket Granting Service (TGS)
  • Authentication Service (AS)
  • Service Principal Names (SPNs)
  • Kerberos security mechanisms

Learning Outcomes:

Understand the complete Kerberos authentication process and identify potential attack vectors.

๐ŸŽซ Lesson 2: Golden & Silver Ticket Attacks

120 minutes

Topics Covered:

  • Golden ticket attack methodology
  • Silver ticket exploitation
  • KRBTGT account compromise
  • Service account exploitation
  • Persistence mechanisms

Learning Outcomes:

Master advanced ticket-based attacks and understand their detection and prevention.

๐Ÿ”ฅ Lesson 3: Kerberoasting & AS-REP Roasting

105 minutes

Topics Covered:

  • Kerberoasting attack techniques
  • AS-REP roasting methodology
  • Service account enumeration
  • Hash cracking strategies
  • Prevention and detection

Learning Outcomes:

Execute credential harvesting attacks and implement effective countermeasures.

๐Ÿ”„ Lesson 4: Delegation Abuse & Advanced Attacks

135 minutes

Topics Covered:

  • Unconstrained delegation abuse
  • Constrained delegation exploitation
  • Resource-based constrained delegation
  • S4U2Self and S4U2Proxy attacks
  • Advanced persistence techniques

Learning Outcomes:

Understand delegation vulnerabilities and implement comprehensive security controls.

๐Ÿงช Hands-on Labs

๐Ÿ”ฌ Lab 1: Kerberos Attack Simulation

2 hours

Lab Objectives:

  • Set up Kerberos attack environment
  • Execute Golden ticket attack
  • Perform Silver ticket exploitation
  • Analyze attack artifacts

Requirements:

Windows domain environment, attack tools, monitoring capabilities

๐Ÿ›ก๏ธ Lab 2: Kerberos Defense Implementation

2.5 hours

Lab Objectives:

  • Implement Kerberos security controls
  • Configure monitoring and alerting
  • Test defense effectiveness
  • Document security improvements

Requirements:

Windows domain environment, SIEM/logging capabilities, security tools

๐Ÿ› ๏ธ Essential Tools

๐ŸŽฏ Attack Tools

  • Rubeus - C# Kerberos attack toolkit
  • Mimikatz - Credential extraction and ticket manipulation
  • CrackMapExec - Post-exploitation framework
  • Kerbrute - Kerberos brute force tool

๐Ÿ” Analysis Tools

๐Ÿ›ก๏ธ Defense Tools

๐Ÿ“Š Assessment & Certification

๐Ÿ“ Module Assessment

Comprehensive assessment covering all Kerberos security concepts, attack techniques, and defense strategies.

  • Multiple choice questions
  • Practical scenario analysis
  • Attack technique identification
  • Defense strategy evaluation
Take Assessment

๐Ÿ† Completion Certificate

Earn a certificate upon successful completion of all lessons, labs, and assessments.

  • Digital certificate
  • LinkedIn profile integration
  • Verification system
  • Continuing education credits
View Certificate

๐Ÿ”— Additional Resources

๐Ÿ“ง Stay Updated with New Modules

Get notified when we add new advanced modules and expert content!