The Bronze Bit Attack can Bypass Kerberos Protocol | Cyware Hacker News

Employing this assault approach, right after compromising a network, an attacker can extract password hashes to bypass and forge credentials for other devices on the exact same network.