Author:
Lazarov Willi,Bohacik Antonin,Kohout David,Fujdiak Radek
Publisher
Springer Nature Singapore
Reference18 articles.
1. Badhwar, R.: Advanced active directory attacks and prevention. In: Badhwar, R. (ed.) The CISO’s Next Frontier, pp. 131–144. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-75354-2_13
2. Boldyreva, A., Kumar, V.: Provable-security analysis of authenticated encryption in kerberos. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 92–100 (2007). https://doi.org/10.1049/iet-ifs.2011.0041
3. Brno University of Technology: BUTCA – CYBER ARENA. https://butca.vut.cz/en/. Accessed 12 Nov 2023
4. Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A., Walstad, C.: Formal analysis of kerberos 5. Theoret. Comput. Sci. 367(1), 57–87 (2006). https://doi.org/10.1016/j.tcs.2006.08.040
5. Chandel, R.: Lateral movement: Pass the ticket attack. https://www.hackingarticles.in/lateral-movement-pass-the-ticket-attack. Accessed 23 Nov 2023