Wonderful explanation sir. You explain the concepts very clearly. Please continue to upload videos like these. Students need your help. Thank you very much, sir.
Concept is clear and sir u give lots of information about the topic. After viewing ur videos if I have any doubt ur comment section helps me a lot. So please provide solutions to the questions in comment section. Thankyou once again sir
Dear brotherSundeep I am very impressed with your teaching and that show your talent very much. I was also wondering if you can number all your security accordingly so when we are learning we can follow the steps. Well done brother and God bless.
I think during step 2, when AS sends message to Client the whole message should be encrypted by the secret key of client otherwise client cannot decrypt the message to extract the ticket of tgs to be sent to the next step.
It would be nice if you can demonstrate and explain the Kerberos authentication process using a Fiddler/Wireshark capture, while breaking down the base64 encoding process.
Sir there r few mistakes ..in the video..like 1. Pwd is not sent from client only two IDs are sent. AS server replies to request from client with msg encrypted with pwd, hence no reqmnt of sending pwd on unsecured media. 2. As per your second msg it is encrypted with key of TGS but it is not available with client so how will it decrypt it then. Actually the msg is encrypted with client pwd it serves both purpose as mentioned above. 3. You did not mention about lifetime parameter which is imp to counter replay attacks. 4. And finally in summary K subscript c is not session key as u mentioned but it is client pwd which is used as key and. K c,tgs is not secret key it is session key and K tgs is the secret key.
hi pankaj thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi goswami thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
sir in first step slight correction is there where client USER ID is sent only which is encrypted with HASH of user password. user password is never sent on unsecured medium.
I think we need to be very clear from where the different parameters are obtained. Example: in Kerberos, isn't the password stored as a hash? then when the 1st requests sent, how will the AS have the password to decrypt the request.
Your explanation is very good Sir, every topic is explained in a simplified way and it becomes easy to understand. The only problem I find is when I am watching your video: The background light is too bright so I find it difficult to read and also focus is not set properly so the whiteboard seems blurry at times.
hi kishore thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi Gambhir First digram is for getting the service from the server which is in same network. Second diagram is for getting the service from the server which is in another network. Hope your doubt has been clarified.
14:15 if the request is encrypted, then how will the authentication server be able to get the id from the request? edit: in all in one it says request to auth server is not encrypted. Only the response from the auth server is encrypted.
At 6:44 u said the client is requesting server id to authentication server and again at 6:53 u said the client sends its own id appended with server id.Could u make it clear how can the client know the server id when it's requesting server id iteslf
hi yaswanth soon i will try to upload and that is complete theoretical and easy to understand in a single reading. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Client just forwards the ticket to TGS without decryption,Ticket is like a pass. Assume AS as a ticket counter and TGS as a train and you're the client, you know where the train will be available, but you can't enter in it directly, so you buy a ticket from AS and with it you enter the train.
how it works in real time scenario ? Like form the user logged in to his laptop with the Domain user id and password and they how he gets authenticated
Sir at 16:35 session key along with Ticket tgs is given to client by the authentication server and then client sends the Ticket tgs to Ticket granting server,what happens to session key in this period and what is role of session key
hi Akshay Session key is only valid till some time period and if that time exceeds the key will be expired and not usable.You can observe this session in banking sites.If you login to your bank and kept idle for few minutes then you cant perform any further transaction and you will receive the alert as session expired. Hope your doubt has been clarified.
sir lectures are very good but, for some vedios there is no clarity. koncham manchi camera vadandi sir. migata imortant vedios kuda upload cheyandi sir
Wonderful explanation sir. You explain the concepts very clearly. Please continue to upload videos like these. Students need your help. Thank you very much, sir.
This video is better than my Master's in Cyber Security teaching in USA :D Good job sir !!
Awesome explanation sir
Today is my sem exam. Thank you so much for helping me with ur lectures
Same guy
Sir thank you for your beautiful explanation. I was not able to understand it from the book. You clarified really well. Thank you again
Ur teaching is exllent sir tomorrow is exam sir thank u
you really work hard in making us understood the concept very clearly....thanks to you.
Very nice teaching and I am very much captivated to ur dedication tq ...sir
Exam ke akhri din aap hi log kaam aate.. Allah aapka bhala kare🙏😭
Thank you sir very well explain worth watching this long video ... 😄
Concept is clear and sir u give lots of information about the topic. After viewing ur videos if I have any doubt ur comment section helps me a lot. So please provide solutions to the questions in comment section. Thankyou once again sir
Thanks a lot, once again. You teaching is fluid and easy to understand. don't stop
Sir your teaching was so nice you are like a god to me for this subject.
Good
Sir ...thr is no confusion...wat u explained is gud and am clear
Fabulous teaching sir tq very much
very nice sir. your teaching way is very good
Tnq u sir... Tnq u soo much Tommarrow I am going to rock the exam....tnq u for if vedios and Tnq u for helping me in learning network security
Dear brotherSundeep I am very impressed with your teaching and that show your talent very much. I was also wondering if you can number all your security accordingly so when we are learning we can follow the steps. Well done brother and God bless.
hi kefle
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Great service to society sir thank u sir
hi Ramya
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
impressed with your teaching
Thanks for the explanation Sir...Really helpful... Please continue creating such informative videos.
thankyou so much, it helps me a lot in yesterday's university exam! thankyou sir!
Thank you sir ji👍
Thakn you very much Sir. You explain it very well.
I think during step 2, when AS sends message to Client the whole message should be encrypted by the secret key of client otherwise client cannot decrypt the message to extract the ticket of tgs to be sent to the next step.
Explanation is so clear... Thank you so much
hi sindhuja
thanks for watching my sessions and supporting our channel.keep following our channel.
Very good explanation. Thank you 👌👌
Thank you
Very much helpful for my exams
Very good explanation.
It would be nice if you can demonstrate and explain the Kerberos authentication process using a Fiddler/Wireshark capture, while breaking down the base64 encoding process.
One of the best explanation of Kerberos authentication process. Do we have any LDAP video?
It's a great session for me to know the authentication server. Thanks.
Sir there r few mistakes ..in the video..like 1. Pwd is not sent from client only two IDs are sent. AS server replies to request from client with msg encrypted with pwd, hence no reqmnt of sending pwd on unsecured media. 2. As per your second msg it is encrypted with key of TGS but it is not available with client so how will it decrypt it then. Actually the msg is encrypted with client pwd it serves both purpose as mentioned above.
3. You did not mention about lifetime parameter which is imp to counter replay attacks.
4. And finally in summary K subscript c is not session key as u mentioned but it is client pwd which is used as key and. K c,tgs is not secret key it is session key and K tgs is the secret key.
hi M Go
thanks for your explanation..
Sir can upload videos on MD5 , algamal and elliptical curve cryptography..
i will try to upload md5 algorithm soon
Awesome brother, thank you so much
Thanks for sharing the Knowledge Sir.
great teaching
very detailed and conceptual explanation
You are simply the BEST...
hi Neha
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir pl can you give ur mail id
You can reach me at
whatsapp: 9515140494
Email : askme.selflearning@gmail.com
best so far
You are the best teacher!
Great work sir.
hi
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Excellent explainaton
hi pankaj
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Very well explained.
Thank you.
thanks for the lesson
i like your vedios very much ..it hepls me a lot... sir please make a vedio on x.509 certificate authentication
hi goswami
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Great explanation.
sir in first step slight correction is there where client USER ID is sent only which is encrypted with HASH of user password. user password is never sent on unsecured medium.
I think we need to be very clear from where the different parameters are obtained. Example: in Kerberos, isn't the password stored as a hash? then when the 1st requests sent, how will the AS have the password to decrypt the request.
Nicely explained sir:)
hi pooja
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
that's just amazing
Thank you so much for the videos they are very helpful
Your explanation is very good Sir, every topic is explained in a simplified way and it becomes easy to understand. The only problem I find is when I am watching your video: The background light is too bright so I find it difficult to read and also focus is not set properly so the whiteboard seems blurry at times.
Nice explaination sir ji
hi
thanks for watching my sessions. Thanks for your interest and support towards our channel. Keep following our channel.
hi beautiful explanation. may i know what kind of databases it can support ? how to setup this aunthentication to kafka ? can you please do video
Tq soo much sr😊
Hello Sundeep
Thanks a lot for the detailed explanation
Can you please confirm if any video is available regarding the debugging of Kerberos ticket
Really very helpful and informative. Benefited a great deal.Can you please post a video on http and https. thank you,..
hi mercy paul
thanks for your interest towards our channel.
Can I expect a session on http and https soon :)
Thank you so much sir, You are amazing!!!
Great season 👍
Super sir 👍:-)
nice sir g
hi vinay
thanks for watching my sessions and interest towards our channel. keep following.
thank you sir
this always saves night before exam. Thank you
Thanks sir
Excellent
hi kishore
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
18:03 isnt it ID of server? how does client know tgs at first request?
Id of the server will be provided by TGS, So, firstly Client will request the ID of TGS. @nikhil
@@AbhijeetSingh-hj8yg TGS will provide the ticket of server, I think @nikhil t is correct
Sir thank you for the explanation. I wanted to ask can we use the equations you wrote before making the 2nd diagram as well?
hi Gambhir
First digram is for getting the service from the server which is in same network.
Second diagram is for getting the service from the server which is in another network.
Hope your doubt has been clarified.
Well done but some what we want. That's theory will be means better not only formulas
14:15 if the request is encrypted, then how will the authentication server be able to get the id from the request?
edit: in all in one it says request to auth server is not encrypted. Only the response from the auth server is encrypted.
encryption and decryption points are not clear. How come client receives a Session Key if Message 2 is encrypted using Ticket TGS?
At 6:44 u said the client is requesting server id to authentication server and again at 6:53 u said the client sends its own id appended with server id.Could u make it clear how can the client know the server id when it's requesting server id iteslf
BIG THANKS
NICE
Thanks brother man!!!!! ¡
nice
Hello Sundeep, very good video. Is Kerberos Symmetric or Asymmetric?
Thanks 😃
very good
please tell about the versions of keberos 4 & 5 and differences
hi yaswanth
soon i will try to upload and that is complete theoretical and easy to understand in a single reading.
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Hi sir
I would like to build my career in network security please guide me .....as a beginner what should I do? What certification needs to be done?
thank you for this helpfull video. please specify the version4 and version 5.
At 20:52 in step two (AS to C ) if data is send encrypted with Tgs ,then how client will decrypt to get Ticket of tgs ?
Client just forwards the ticket to TGS without decryption,Ticket is like a pass.
Assume AS as a ticket counter and TGS as a train and you're the client, you know where the train will be available, but you can't enter in it directly, so you buy a ticket from AS and with it you enter the train.
Ticket_tgs - doesn not contain the address of TGS, you already know where it is, it's like a pass, only if you have the pass you get access to TGS.
how it works in real time scenario ? Like form the user logged in to his laptop with the Domain user id and password and they how he gets authenticated
Sir cloud computing kuda chepandi.Its to easy to writing exams
sir in first diagram u said client request to as nd as a response to client that is ticket v but at 9:30 u write ticket of tgs can u pla confrom sir
sir, In this viedo you explained only version4 messages and I want version5 messages clear explanation
Can you please make the video for Replication Process for Active Directory?
hi pankaj
i will try to upload.
Sir at 16:35 session key along with Ticket tgs is given to client by the authentication server and then client sends the Ticket tgs to Ticket granting server,what happens to session key in this period and what is role of session key
hi Akshay
Session key is only valid till some time period and if that time exceeds the key will be expired and not usable.You can observe this session in banking sites.If you login to your bank and kept idle for few minutes then you cant perform any further transaction and you will receive the alert as session expired.
Hope your doubt has been clarified.
here kerberos block is KDC i think. please correct me if i am wrong
Hello sir, can you become a full time associate professor at our college(SFIT)?? We have only one good professor for CSS subject.
Borivali lol😂😂
can't understand those message exchanges
sir lectures are very good but,
for some vedios there is no clarity.
koncham manchi camera vadandi sir.
migata imortant vedios kuda upload cheyandi sir
hi PSR
sure i will upload them soon
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
Sir plz upload summary of kerberos.... Version 4 message exchange...
Sir tell me about technical deficiencies, version 4 issues, ticket flaging
Sir please upload the video of X.509 certificate too
Sir plz tell about the Kerberos version 5 & 4
Sir kindly release transport layer security,https ,ssh,mobile device security,wireless security
Sir do you have any material for network security
can we say that the authenticator server be a Active directory server
Plz Sir can u uploade the video for x.509 certificate????
hi deepa
soon i will try to upload it.
Sundeep Saradhi Kanthety OK sir..
Can u please post blow fish, rc4,rc5 and idea algorithms