<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Token-Based Authentication on simeononsecurity</title><image><url>https://simeononsecurity.com/tags/token-based-authentication//img/banner.png</url><title>Token-Based Authentication on simeononsecurity</title><link>https://simeononsecurity.com/tags/token-based-authentication/</link></image><link>https://simeononsecurity.com/tags/token-based-authentication/</link><description>Recent content in Token-Based Authentication on simeononsecurity</description><generator>1337 H4X0R RSS GENERATOR</generator><language>en</language><lastBuildDate>Sun, 27 Dec 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://simeononsecurity.com/tags/token-based-authentication/index.xml" rel="self" type="application/rss+xml"/><item><title>Today I Learned about CVE-2020-17049 and Windows Token-Based Activation</title><link>https://simeononsecurity.com/til/2020-12-28/</link><pubDate>Sun, 27 Dec 2020 00:00:00 +0000</pubDate><category>
"Computer Security"
, "Kerberos Vulnerability"
, "Windows Activation"
, "Active Directory Compromise"
, "Network Security"
, "Cybersecurity Exploits"
, "Microsoft Security"
, "Token-Based Authentication"</category><guid>https://simeononsecurity.com/til/2020-12-28/</guid><comments>https://github.com/simeononsecurity/simeononsecurity.com-comments/issues</comments><description>
&lt;p&gt;&lt;strong&gt;What SimeonOnSecurity learned about and found interesting today&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;SimeonOnSecurity recently learned about two topics in the field of computer security: CVE-2020-17049, also known as the Kerberos Bronze Bit Attack, and Windows Token-Based Activation.&lt;/p&gt;
&lt;p&gt;The Kerberos Bronze Bit Attack, as explained in a series of blog posts by Netspi and in a post by Trimarcsecurity, is a vulnerability in the Kerberos authentication protocol. This vulnerability could potentially allow an attacker to compromise an Active Directory, which is a central repository for information about an organization&amp;rsquo;s users, computers, and other resources. The deployment of Kerberos S4U changes to address this vulnerability is discussed in a Microsoft support article.&lt;/p&gt;</description></item></channel></rss>