Kerberos is one of the most established network authentication protocols. It uses secret-key cryptography to verify identities over insecure networks. In a Kerberos Security Review, the focus is on understanding how tickets, authenticators, and time stamps work together to keep credentials safe. The protocol’s design aims to stop eavesdropping and replay attacks, while also reducing the risk of password exposure.
At its core, Kerberos relies on a trusted third party: the Key Distribution Center (KDC). The KDC has two parts — the Authentication Server (AS) and Ticket Granting Server (TGS). When a client wants access to a service, it first talks to the AS to get a Ticket Granting Ticket (TGT). With the TGT, the client requests a service ticket from the TGS. The service ticket is then used to prove identity to the actual service. All of this happens with encrypted data, and each ticket has a short lifespan.
A proper Kerberos security review will examine key risks: