_________ ____ __. __________.__ .__ __
\_ ___ \____________ ____ | |/ _|__________\______ \ | |__|/ |_________
/ \ \/\_ __ \__ \ _/ ___\| <_/ __ \_ __ \ | _/ | | \ __\___ /
\ \____| | \// __ \\ \___| | \ ___/| | \/ | \ |_| || | / /
\______ /|__| (____ /\___ >____|__ \___ >__| |______ /____/__||__| /_____ \
\/ \/ \/ \/ \/ \/ \/
v2
C R A C K E R B L I T Z
CracKerBlitz for roasting, Bellaros for ( lib )
Abusive and aggressive ( Kerberos ) attack
This section covers some notes on the operational security of using Bellaros
in an environment, with some technical examples comparing/contrasting some of its approaches.
The material here will be expanded in the future.
thanks to ( Rubeus ) and several roasting scripts.