POPULARITY
On this week's episode, host TJ Null is joined by Tim Medin. Tim is the creator of kerberoasting and the CEO of Red Siege Information Security. He begins by recounting how he joined the infosec field as well as some resources he used to get himself started. Next, he highlights his favorite tools that he enjoys using on an engagement. TJ and Tim also chat about the first moment Tim discovered kerberoasting and his research on new attack techniques. He gives advice to users who want to implement detection/protection against kerberoasting. Then, he details what it's like to run his own consulting company, Red Siege, and shares tips for those looking to start their own. Tim also reveals the one thing he would like to see change in the infosec community. Lastly, he discusses his love for the Olympics and football and his interest in competing in triathlons. Enjoy the episode!
Links to today's topics: Liquor stores stuck with limited stock since Christmas cyber attack against Sask. liquor authority | CBC News microsoft-warns-disk-wiping-malware-targeting-ukraine white-house-instructs-agencies-cybersecurity-strategy-memo-cisa Moving the U.S. Government Toward Zero Trust Cybersecurity Principles mexican-cartels-recruit-drug-mules-on-grand-theft-auto-online senate-weighs-bill-to-protect-satellites-from-getting-hacked florida-considers-deepfake-ban sweden-launches-psychological-defense-agency-to-counter-disinformation apple-scrubs-support-pages-all-mentions-controversial-csam image scanning feature Bored Ape Yacht Club Artist Says Compensation 'Definitely Not Ideal' Where can you find Tim Medin? twitter.com/TimMedin linkedin.com/in/timmedin/ tim@redsiege.com redsiege.com/discord Where can you find Jason Wood? twitter.com/Jason_Wood linkedin.com/in/tadaka/ tadaka@gmail.com Got suggestions, complaints, or feedback? Tell us at podcast@secureideas.com or reach out on Twitter: twitter.com/sweaney twitter.com/darth_kevin twitter.com/secureideas Join our Professionally Evil Slack Team at www.professionallyevil.com Our real jobs pay for our time to do this, so if you have opportunities around penetration testing or risk management, we'd love the chance to work with you!
In 2014, researcher Tim Medin, a senior SANS instructor and content developer, took the Infosec milieu by surprise when he disclosed Kerberoast. This manifold implementation or process of brute forcing credential hashes within the Windows Active Directory ecosystem would soon become the de facto attack vector against the Kerberos protocol, leveraging certain exploitable authentication and encryption mechanisms of the popular MIT-born technology while embroiling the Redmond giant in a cascade of existential threats for years to come. Owing to this, it would take the effort of the entire cybersecurity community to later arrive at a suitable arrangement of detection and mitigation opportunities. As pervasive as it was, Kerberoast actually embodied only a handful of operating principles which allowed non-privileged domain users to get their hands on so-called service accounts, an alluring proposition that was usually met with a favorable outcome in the case of service accounts having weak passwords. Needless to say, the formalism known as Kerberoasting, as early adopters coined the new technique, was quickly charged with being an accessory to a growing number of post-exploitation scenarios that plagued modern enterprises from all across the globe. In this blog post, we will explore the Kerberoasting affair in light of its salient features; taking a quick dive into some of its more creative touches and periodizing important ideas as they pertain to the privilege escalation and lateral movement aspects of the cyber kill chain, as well as to its contribution to the ever-growing list of network threats. We'll begin our journey by revisiting Kerberos, examining its pitfalls and going into some detail as to why the former crypto apparatus exposed critical vulnerabilities that led to the extraction of such sensitive data with such little relative effort. Let's begin. Kerberos revisited Distributed computing systems in the late 80s presented unique challenges against the authentication backdrop in which one endpoint entity was required to prove its trust worthiness to another, preferably in a single sign-on fashion that could take advantage of a centralized management infrastructure according to the technology of the day. In this context, Kerberos quickly emerged as an arbitrator protocol between client and server that leveraged cryptographic tickets as the accepted authentication exchange mechanism between trusted hosts to achieve controlled access to services and applications. Over the years, Kerberos spanned five different models or versions that encompassed several subprotocols rolled into three different components: a trusted third party, also called a key distribution center or KDC, with a database of principals (user and service accounts) and their corresponding shared secrets to perform authentication with; a client, or privileged user, who negotiates authentication within a specific realm by issuing a request to the ticket-granting service (TG-S) for a special ticket (TG-T or ticket granting ticket) that is used to derive the necessary credentials to gain access to a specific resource; and a service, or application server, hosting data or the resource in question that is being requested by the client. Kerberos excelled in cross-realm scenarios where organizational boundaries required authentication across different network segments. Organized in a hierarchical manner, these inter-realm capabilities are the main driving force behind Microsoft's Active Directory and the way in which this proprietary implementation of Kerberos version 5 establishes user control and authentication. This represented a vast improvement over previous Ntlm-based approaches, including the adoption of symmetric cryptographic primitives and "salting" in lieu of password hashing, or the aforementioned mutual authentication and delegation feature options required by multi-tier applications. Kerberos is also classified as an open standard, which technically...
Tim Medin joins me on this podcast to talk about his journey to starting the pentesting company Red Siege. He gives advice to pentesters who might be thinking of going out on their own to weigh the pros and cons. From there we discuss some of the pentesting strategies that have emerged over the last...
Join the BHIS Discord discussion server: https://discord.gg/aHHh3u5 We're really excited to have a close member of our BHIS extended family, Tim Medin from Red Siege InfoSec, here for a webcast […] The post Webcast: Kerberos & Attacks 101 appeared first on Black Hills Information Security.
Ramadhanmu #dirumahaja? Harus gimana? yuk simak! :)
DailyCyber The Truth About Cyber Security with Brandon Krieger
In today’s DailyCyber Podcast I am fortunate to interview Tim Medin the Principal Consultant Red Siege Information Security. We discuss the Cyber Security industry, Penetration Testing and much more. If you are interested in Penetration Testing this is a Podcast you don’t want to miss. To learn more watch the video or listen to the podcast at www.DailyCyber.ca and comment below Join me for the ride by subscribing to the channel and don't forget to say hi on my social links below! ► SOCIALWebsite: https://www.DailyCyber.caLinkedin: https://www.linkedin.com/in/brandonkrieger/Twitter: https://www.Twitter.com/BrandonKriegerInstagram: https://www.Instagram.com/BrandonKrieger ► GEAR & FAVORITESCamera 1: https://amzn.to/31qb1yrFuture Camera 2: https://amzn.to/2B8YjJKCamera Mic: https://amzn.to/2KG2MsqPodcast Mic: https://amzn.to/2QDlepu Music by from: www.Artlist.io This video is not sponsored.All products I purchase myself unless otherwise stated in the video.This post contains affiliate links at no additional cost to you. They help to keep this channel up and running. I appreciate your support!!
In this episode, James talks with Tim Medin regarding Meteor and security. If you develop with Meteor or have to test it, there is a lot of information packed in. More about Tim Medin (@timmedin): Red Seige website - https://www.redsiege.com/ Link to Meteor Minor and other tools Tim mentioned: https://github.com/nidem Tim Medin's Bsides Orlando 2017 Presentation - Tim Medin - Mining Meteor B-Sides Orlando 2017 For more info go to https://www.developsec.com or follow us on twitter (@developsec). Join the conversations.. join our slack channel. Email james@developsec.com for an invitation. DevelopSec provides application security consulting and training to add value to your application security program. Contact us today to see how we can help.
Tim Medin from SANS comes on the show and does a tech segment on Windows PowerShell using PowerShell Empire. Full Show Notes: https://wiki.securityweekly.com/Episode535 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.comsecurityweekly
Tim Medin from SANS comes on the show and does a tech segment on Windows PowerShell using PowerShell Empire. Full Show Notes: https://wiki.securityweekly.com/Episode535 Subscribe to our YouTube channel: https://www.youtube.com/securityweekly Visit our website: http://securityweekly.com Follow us on Twitter: https://www.twitter.comsecurityweekly
Richard Moulds of Whitewood Security and Gadi Evron of Cymmetria join us for interviews, and Tim Medin of the SANS Institute delivers a tech segment on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode535 Visit https://www.securityweekly.com for all the latest episodes! →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
Richard Moulds of Whitewood Security and Gadi Evron of Cymmetria join us for interviews, and Tim Medin of the SANS Institute delivers a tech segment on this episode of Paul’s Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode535 Visit https://www.securityweekly.com for all the latest episodes! →Visit our website: https://www.securityweekly.com →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
Tim Medin on Smart Ways To Crack Password Hashes: Drunken Security News Segment: Episode 270 Show Notes Episode 270 - Direct Audio Download Episode Hosts: Paul Asadoorian, Host of Security Weekly and Stogie Geeks Larry Pesce, Host of Hack Naked At Nite Jack Daniel, Security B-Sides Tune in to Paul's Security Weekly TV, Hack Naked TV, and Hack Naked At Night episodes on our Bliptv channel. Audio Feeds: Video Feeds: