Professional Windows Desktop and Server Hardening (Programmer to Programmer)

Kak worm, 46

Kerbcrack program, 170–171

Kerberos authentication package, 159

Kerberos authentication protocol

attack tools for, 170–171

definition of, 154–156

group policy settings for, 494

limitations of, 157

Kerberos Authentication Service (AS) exchange, 155

Kerberos Client/Server exchange (Application Exchange), 156

Kerberos Key Distribution Center service, 273, 287

Kerberos Network Monitor, 156

Kerberos Ticket Granting Service (TGS) exchange, 155–156

Kerbsniff program, 170–171

Key Archival and Management in Windows Server 2003, 478

.key files, 201, 248

keystroke logging hardware, 166

keystroke logging trojans, 165

Klist utility, 156

"Know Thy Enemy" strategy (Sun Tzu), 3

Konqueror browser, 350

KRA (Key Recovery Agent), 74, 475–476

Krbtgt account, 101

Krbtray utility, 156

Категории