Active Directory (AD) is a centralized directory service developed by Microsoft for managing users, computers, and permissions in Windows networks.

Kerberos Authentication

Kerberos is the primary authentication protocol in Active Directory. It uses a ticket-based system instead of sending passwords over the network.

How Does It Work?

Client   ──AS-REQ──>  KDC
Client   <─AS-REP──   TGT (encrypted with krbtgt key)
Client   ──TGS-REQ─>  KDC
Client   <─TGS-REP─   TGS (service ticket)
Client   ──────────>  Service (using TGS)
# View current tickets
klist

# Request a service ticket
kinit -S cifs/fileserver.corp.local user@CORP.LOCAL

Key point: TGT is valid for 10 hours by default. If stolen, it can be used until expiry.

NTLM Authentication

NTLM is an older protocol still used when connecting to machines outside the domain or via direct IP.

Challenge-Response Flow

Client   ──NEGOTIATE──>  Server
Client   <─CHALLENGE──   nonce (random value)
Client   ──RESPONSE──>   Hash(nonce + password)
# Check authentication protocol used
Get-WinEvent -LogName Security | Where-Object {$_.Id -eq 4624} |
  Select-Object -First 5

Key difference: NTLM is weaker than Kerberos — it doesn’t support Mutual Authentication.