April 2024
Intermediate to advanced
608 pages
17h 13m
English

The two previous chapters covered the two main network authentication protocols in Windows, NTLM and Kerberos. However, Windows supports several more packages for performing authentication. In this chapter, we’ll briefly cover some of these other security packages.
I’ll begin by providing more detail about how applications and security packages can use buffers to pass data back and forth using the SSPI APIs. This will help you understand some of the packages’ quirks. Then we’ll examine the Negotiate security package, as well as the less common secure channel and CredSSP packages. I’ll ...