Explore >> Select a destination


You are here

blog.xpnsec.com
| | www.securitynik.com
1.6 parsecs away

Travel
| | In this post, I'm learning about Kerberos and one of its attacks. Specifically, I'm learning about Authentication Service Response (AS-REP) ...
| | blog.oddbit.com
2.7 parsecs away

Travel
| | There are many guides out there to help you configure your Linux system as an LDAP and Kerberos client to an Active Directory server. Most of these guides solve the problem of authentication by embedding a username and password into a configuration file somewhere on your system. While this works, it presents some problems: If you use a common account for authentication from all of your Linux systems, a compromise on one system means updating the configuration of all of your systems. If you don't want to ...
| | blog.cryptographyengineering.com
5.9 parsecs away

Travel
| | I learn about cryptographic vulnerabilities all the time, and they generally fill me with some combination of jealousy ("oh, why didn't I think of that") or else they impress me with the brilliance of their inventors. But there's also another class of vulnerabilities: these are the ones that can't possibly exist in important production software,...
| | blog.kuhi.to
25.4 parsecs away

Travel
| Why? I recently earned my OSWE. As always, I used the last few days before the exam to read reviews about other peoples experiences. I couldnt find many articles about this course, so I decided to write this review.