Synchronized Synchronization Protocol Attack (Kerberos)

Assuming an attacker can control the clock of Alice, Bob, and KDC (key distribution center), how can an attacker attack the Kerberos protocol?

+3
source share
1 answer

A detailed analysis of this was done in 2003 by Joel Weber.

+5
source

Source: https://habr.com/ru/post/1756579/


All Articles