CertMike Explains Kerberos
Вставка
- Опубліковано 14 бер 2022
- Kerberos provides centralized authentication across a variety of operating systems and applications. It uses a confusing combination of servers and tickets to achieve this goal and you’ll find questions about Kerberos on nearly every cybersecurity certification exam.
In this video, certification and cybersecurity expert Mike Chapple breaks down the basics of Kerberos to help you prepare for your exam.
Learn more about Mike's full certification preparation programs at www.certmike.com/
#cybersecurity #CertMike #Kerberos #CISSP #SecurityPlus #CompTIA #CISM - Наука та технологія
Thanks Mike, I am preparing to present CISSP examination, I am seeing your videos before study theory in some cases. They are very helpful. Kerberos is the devil.
How in the world did you remember all those steps in that detail. Good on you Mike!
same. It's so complicated
Mike this is a good presentation with about the perfect level of detail. One critique is I didn't see any arrows demonstrating how the database server interacts (if and when) with the AS and TGS. The other one is more of an observation as well as a request, and that is: WHY was kerb designed with this (to the novice like myself in this case) particular structure? Each step must by definition have a purpose where to have done it another way would have increased risk. Given security is an open source community, there must be a consensus on that to some degree. A video with this logic explained along with "well, if we skipped this step then this would happen" etc. - I have subscribed and would gladly watch that if you create it.
With a bit more detail, something like "What if we started with just a username and password? Well, we want to centrally manage so an AS ... OK let's introduce that .. next step etc" and so on
Hi sir does the Database server communicate with the KDC to grant access?
Solid - thank you, Mike. 💫
why are you thanking yourself
I read the official CISSP study guide, then watch the video. Still confused. Way too many arrows, keys, and authenticators. Need a better way of distinguishing between the parts.
It is confusing!!
Hello Mike, could you please clarify, does authentication server use password or password hash to encrypt first message it sends? Because it looks as a weak protection measure to encrypt message with such a low length key as passwords usually are and also to store password as is.
He doesn't know..
Just reading something like them all
It uses a PWD hash
Could have been better.