CertMike Explains Kerberos

Поділитися
Вставка
  • Опубліковано 14 бер 2022
  • Kerberos provides centralized authentication across a variety of operating systems and applications. It uses a confusing combination of servers and tickets to achieve this goal and you’ll find questions about Kerberos on nearly every cybersecurity certification exam.
    In this video, certification and cybersecurity expert Mike Chapple breaks down the basics of Kerberos to help you prepare for your exam.
    Learn more about Mike's full certification preparation programs at www.certmike.com/
    #cybersecurity #CertMike #Kerberos #CISSP #SecurityPlus #CompTIA #CISM
  • Наука та технологія

КОМЕНТАРІ • 14

  • @zsurdo
    @zsurdo 2 роки тому +9

    Thanks Mike, I am preparing to present CISSP examination, I am seeing your videos before study theory in some cases. They are very helpful. Kerberos is the devil.

  • @mattm7798
    @mattm7798 Рік тому +6

    How in the world did you remember all those steps in that detail. Good on you Mike!

  • @samuelfullman
    @samuelfullman 11 місяців тому

    Mike this is a good presentation with about the perfect level of detail. One critique is I didn't see any arrows demonstrating how the database server interacts (if and when) with the AS and TGS. The other one is more of an observation as well as a request, and that is: WHY was kerb designed with this (to the novice like myself in this case) particular structure? Each step must by definition have a purpose where to have done it another way would have increased risk. Given security is an open source community, there must be a consensus on that to some degree. A video with this logic explained along with "well, if we skipped this step then this would happen" etc. - I have subscribed and would gladly watch that if you create it.

    • @samuelfullman
      @samuelfullman 11 місяців тому

      With a bit more detail, something like "What if we started with just a username and password? Well, we want to centrally manage so an AS ... OK let's introduce that .. next step etc" and so on

  • @diegoramos27
    @diegoramos27 Місяць тому

    Hi sir does the Database server communicate with the KDC to grant access?

  • @mikekorsak373
    @mikekorsak373 5 місяців тому

    Solid - thank you, Mike. 💫

  • @victoriashearing6574
    @victoriashearing6574 Рік тому +4

    I read the official CISSP study guide, then watch the video. Still confused. Way too many arrows, keys, and authenticators. Need a better way of distinguishing between the parts.

  • @andrey2604
    @andrey2604 Рік тому +1

    Hello Mike, could you please clarify, does authentication server use password or password hash to encrypt first message it sends? Because it looks as a weak protection measure to encrypt message with such a low length key as passwords usually are and also to store password as is.

    • @BeyNPreShow
      @BeyNPreShow Рік тому

      He doesn't know..
      Just reading something like them all

    • @spakes9280
      @spakes9280 5 місяців тому

      It uses a PWD hash

  • @auspak7685
    @auspak7685 Рік тому +3

    Could have been better.