From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Authenticate a user

Authenticate a user

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Authenticate a user

- [Voiceover] In most cases, to gain access into a system, we must provide some type of authentication. Microsoft has a proprietary authentication protocol called New Technology LAN Manager which operates within Explorer. New Technology LAN Manager uses a challenge response which is an authentication method where an entity presents a question, or challenge, and another entity must deliver a valid response in order to be authenticated. Kerberos is built into Active Directory, and uses tickets to access services. User accounts and passwords are on the Domain Controller which acts as the Kerberos Key Distribution Center and Active Directory as it's account database. The Key Distribution Center is a single process that provides two services. Authentication Service to get authenticated, and a Ticket Granting Service to obtain a ticket for services. When a user needs access to services on the network, they must first go to the Key Distribution Center which then hits the Authentication…

Contents