Today I Learned about CVE-2020-17049 and Windows Token-Based Activation
Table of Contents
What SimeonOnSecurity learned about and found interesting today
SimeonOnSecurity recently learned about two topics in the field of computer security: CVE-2020-17049, also known as the Kerberos Bronze Bit Attack, and Windows Token-Based Activation.
The Kerberos Bronze Bit Attack, as explained in a series of blog posts by Netspi and in a post by Trimarcsecurity, is a vulnerability in the Kerberos authentication protocol. This vulnerability could potentially allow an attacker to compromise an Active Directory, which is a central repository for information about an organization’s users, computers, and other resources. The deployment of Kerberos S4U changes to address this vulnerability is discussed in a Microsoft support article.
Windows Token-Based Activation is a method of activating Windows products, as described in a Microsoft documentation article. The activation process is performed through the SLMGR.vbs script, as explained in a comprehensive article on ss64.com. A forum post on Microsoft Technet provides more information about Windows 10 Enterprise Token Based Activation.
CVE-2020-17049 - Kerberos Bronze Bit Attack:
- CVE-2020-17049
- CVE-2020-17049: Kerberos Bronze Bit Attack – Practical Exploitation
- CVE-2020-17049: Kerberos Bronze Bit Attack – Theory
- CVE-2020-17049: Kerberos Bronze Bit Attack – Overview
- Kerberos Bronze Bit Attack (CVE-2020-17049) Scenarios to Potentially Compromise Active Directory
- Managing deployment of Kerberos S4U changes for CVE-2020-17049
Windows Token-Based Activation:
Videos of Interest:
- Fungible F1 DPU Powered Storage Hands-on at Fungible HQ
- Heavy gaming on Raspberry Pi 400
- Inside a 32x100GbE Switch and its Big Flaw
- Mastering Chaos - A Netflix Guide to Microservices
- Sony brings OFFICIAL DualSense support to Linux!
- Will Microsoft turn Windows 10 into a yet another Linux distro?