Academy

Module 4 · Why Kerberos Keeps Producing Attacks 🔒

Manish Garg
Manish Garg Associate CISSP · RingSafe
April 22, 2026
6 min read

Kerberos is 35+ years old. It was designed at MIT in 1988 for a specific threat model (one network, trusted users, malicious insiders rare). Active Directory bolted Kerberos onto Windows networks starting in 2000. The threat model never updated. Today, every Active Directory compromise report mentions Kerberos — Kerberoasting, AS-REP roasting, Golden Tickets, Silver Tickets, constrained delegation abuse, S4U2Self, resource-based constrained delegation. This module is about why Kerberos keeps producing attacks.

Why this happens

Kerberos has design features that made sense in 1988:

  • Credentials as symmetric secrets (the user’s password hashes the session key)
  • Tickets are data blobs that can be transferred and replayed until they expire
  • Timestamps for replay protection (assumes synchronized clocks)
  • Cross-realm trust bridges different networks (assumes realms trust each other)
  • Delegation (A can act as B) for multi-hop service chains

Each of these features, in a 2026 network with attacker-controlled endpoints, becomes an attack. The attacker extracts tickets from memory. The attacker forges tickets using captured key material. The attacker abuses delegation to impersonate privileged accounts. The protocol works exactly as designed — and the design enables modern attacks.

Kerberoasting

Any user on the domain can request a service ticket (TGS) for any service principal. The ticket is encrypted with the service account’s password hash (specifically, its NT hash). Attacker extracts the hash offline and cracks it.

🔐 Intermediate Module · Basic Tier

Continue reading with Basic tier (₹499/month)

You've read 25% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
9 more sections locked below