Thank you Sunny. I am humbled by your noble giving heart. With your help, I passed my Network+ COMPTIA exam, and am now pursuing Security+ excellence. Your instructions are such a refreshment in a cruel world. Your help lifts us all; may more love bless your joy!
@@monikabandic5386 Thank you for interest in the journey always forward :-). I pray yours has that continuing higher call. Each of us reaches out every day, and success is found in the thankful love we find. May your journey hold this truth.
Good explanation. I'm glad you corrected the error at 4:30 about step 3 (where you said "encrypt" instead of "decrypt"). That bit had me scratching my head until I read the comments.
My goodness! This is the explanation that my brain is yearning for! Clear, concise and with the added bonus of flowing diagrams. Thank you Sunny! You really are a guiding light for my 30ish brain! ^_^
Great explanation. Minor mistake was duly noted about decryption step between client and fileserver when decrypting the encrypted token granted by the Ticket Granting Server. Thanks!
Thanks! I was thinking the same thing, but wasn't sure. He says at 4:24 "When the file server gets the token, it ENCRYPTS the token", I think he means that it DECRYPTS the token. I had to play that back to make sure I heard what I heard, but if you noticed it too, then I think my gut was right and it's just a mistake in the video.
This is the most useful breakdown of Kerberos I've found anywhere on the Internet. This is gold, thank you! I also wanted to compliment your English language. You took your time and did fantastic pronouncing words. Awesome job!
This just made more than a few Active Directory concepts I've been learning about in my cybersecurity studies click. Wonderfully simple and straightforward explanation!
I searched and found a lot of videos related to network security..but when i saw your video in the list.. suddenly I just clicked on your's one..and got the thing whatever I want to get.. Just want mentor like you on RUclips 😊😊
Thank you for making this video...I searched about Kerberos everywhere and found it difficult to understand. But, you explained in such a simple way that I could easily understand and remember the concept well...thank you so much Sir🙏🏼
I'm in a graduate course in networking and the explanation there was in the form of voluminous text explanation and a crappy graphic from Wikipedia (lame). This is a beautifully clear explanation that leaves no doubts in my mind about the process, or the objects/subjects involved - Thanks!
I paid for many udemy courses and books but this channel is the best. I wish he had some courses in udemy. This channel has very clean and on point explanation within mins. Other courses takes 20mins and you get even more confused..... Please create udemy courses!
been trying to fully wrap my head around Kerberos for a bit now. Love the call to greek mythos, and the video did an excellent job explaining! Thank you!!
Great video! However, there were 2 mistakes: 1) At 2:26, the request is encrypted with a HASH of the clients password, not the clients actual password (because that would mean that the Authentication Server is storing the clients password in plaintext, which is NOT GOOD - it instead stores a hash of the clients password) 2) At 4:32, it should be "decrypts the token" instead of "encrypts the token", because it's already been encrypted. Other than that, great explanation. Very easy to understand!
I think you're right in your first point about this being wrong, but I don't think you're correct either. The initial request to the AS is completely plaintext. Please do correct me if you think I'm wrong. I agree that the _response_ (including the TGS session key etc) from the AS would be encrypted using the hash of the client's password.
@@sb_4 the initial request is the client providing their credentials so that they can be authenticated. Why would that be in plaintext lol. Anyone would be able to sniff the traffic and obtain their credentials that way
@@doomedpepper8109 Because they just send their username, not their password (nor hashed password). There is no need to authenticate, aside from the Authentication Server checking that the user exists, because of the fact that the user can only decrypt the first response from the AS if they know their password / hashed password.
Professor. Very many thanks!!! Kerberos has so many parts and your easy to understand explanation made all thing scome together for me. I liked it and subscribed to your channel. Again, many thanks!
I am glad my videos can be helpful. I love Argentina soccer team. There is an opera song called. "Don't cry for me, Argentina!" It is really great. Greetings from Kansas, USA.
Hi sir first of all thank u for your video..I have one question is that the Token from TGS is encrypted with the new secret key ,then once files server receives the Token that will be "encrypted or de-crypted" from the file server with the shared key which has been sent by TGS? 4:29...
I remember better when I learn fast. If I learn slowly I get bored and lose track and forget everything. I watched lectures at 1x and 2x and then tried to write down what I remembered and had a much better recall when I watched at 2x.
Thank you so much with the clear and consise explaination especially with the shared secret keys which i was confused about. Thank you once again sonny;
Not gonna lie, I usually avoid all video explanations with a presenter that has a strong accent, it really throws me off. I know it's really just my problem because everyone else doesn't seem to have an issue with it except me. The hardest for me are the ones with Indian accents, just can't do it. Anyways, for the longest time I would see the Sunny classroom videos and just ignore them, but the comments were always so positive I decided to give him a try and boy am I glad that I did. Even with the accent, you have such a great way of explaining things, you really make complex subjects easy to understand which is what a good teacher does. Thank you for making the videos!
Moises, I have a remediation for you. You need to either go to India and learn English in their accents. Secondly try the same to practice with Indian people without going there. I have seen many of my American friends they understand Chinese or Indian accents 100%. It needs some patience, which we had to learn English.
I just love your videos, you help me pass my A+ with you perfect explanation and graphics. I feel bad for not paying for your work. Please create some form of a Chanel or upload all these videos on Udemy. You will be a great help to so many students!!!
excellent explanation. very simplified though, without getting into the requests' structure, but all the elements are there. i think the best video for getting the basic understanding of how kerberos work.
Thank you so much sunny sir to provide this video......with the help of this video I can write on examination paper very well.......so thank you so much
This the best explanation about Kerberos I saw on youtube. This is coming from a senior systems engineer. Keep up the good work.
Thank you very much!
instablaster...
Agreed!!!
I agree, best video ever about Kerberos Quick Explanation, thanks
This man can literally make complicated subjects very easy to REMEMBER and UNDERSTAND
Thank you very much! I appreciate it!
Thank you Sunny. I am humbled by your noble giving heart. With your help, I passed my Network+ COMPTIA exam, and am now pursuing Security+ excellence. Your instructions are such a refreshment in a cruel world. Your help lifts us all; may more love bless your joy!
I am happy for you! and congrats on your ComPTIA Network + ! And good luck with your security +, which would cover half of network + content.
How's your journey coming along?
@@monikabandic5386 Thank you for interest in the journey always forward :-). I pray yours has that continuing higher call. Each of us reaches out every day, and success is found in the thankful love we find. May your journey hold this truth.
I'm so happy I decided to study IT at a time when Sunny's videos exist.
Thanks!
Good explanation. I'm glad you corrected the error at 4:30 about step 3 (where you said "encrypt" instead of "decrypt"). That bit had me scratching my head until I read the comments.
Thank you for watching!
My goodness! This is the explanation that my brain is yearning for! Clear, concise and with the added bonus of flowing diagrams. Thank you Sunny! You really are a guiding light for my 30ish brain! ^_^
Finally, this video made the meaning of Kerberos clear for me. The best explanation ever!
Great explanation. Minor mistake was duly noted about decryption step between client and fileserver when decrypting the encrypted token granted by the Ticket Granting Server. Thanks!
Thanks! I was thinking the same thing, but wasn't sure. He says at 4:24 "When the file server gets the token, it ENCRYPTS the token", I think he means that it DECRYPTS the token. I had to play that back to make sure I heard what I heard, but if you noticed it too, then I think my gut was right and it's just a mistake in the video.
WOW! after spending two hours of searching finally I got this. A very very clear video. Thanks for your efforts.
I really liked the visuals you provided. It really helped me understand the "three heads of Kerberos" (the three keys).
This is a simple but yet granular and best explanation on Kerberos authentication context on RUclips. Thank you Sunny for making this videos.
You're most welcome
That was truly brilliant, thanks for making this so easy to understand.
you are welcome. Thank you for leaving nice comment.
Personally, i think this is the best explanation about how Kerberos works on RUclips.
Many thanks. I am glad it helped.
Cannot be explained more simpler than this!! Very good work!! Thanks for uploading..
Most welcome!
you are the best teacher on youtube...with you, learning is too easy..
Whenever I was not clear with any topic I will search for sunny videos in RUclips..
Thank you very much. it means a lot to me.
Unbelievably good explanation. The best I've come across. Keep up the great work!
Thanks a lot.
And just like that, I understand in six minutes what I have been trying to understand for over 30 minutes. Sunny is the best!
This is the most useful breakdown of Kerberos I've found anywhere on the Internet. This is gold, thank you!
I also wanted to compliment your English language. You took your time and did fantastic pronouncing words. Awesome job!
Kerberos has been very difficult for me to comprehend, this helped so much. Thank you Sunny.
You're most welcome
This is ultimate level of explaination with proper visualization diagram. : )
This just made more than a few Active Directory concepts I've been learning about in my cybersecurity studies click. Wonderfully simple and straightforward explanation!
I searched and found a lot of videos related to network security..but when i saw your video in the list.. suddenly I just clicked on your's one..and got the thing whatever I want to get..
Just want mentor like you on RUclips 😊😊
Thank Sunny, I started watching your clips daily, they are so helpful and easy to understand as stated by everyone!
Sunny, I am studying for my SY0-601. Kerberos had me completely baffled until I watched your video. Thank you SO MUCH!!
Thank you for making this video...I searched about Kerberos everywhere and found it difficult to understand. But, you explained in such a simple way that I could easily understand and remember the concept well...thank you so much Sir🙏🏼
This video made the meaning of Kerberos clear for me. The best explanation ever! Amazing!!!!!!!!!!!!!!!!!!!!!
Just got threw multiple youtube lessons about Kerberos, and this explanation was clearly the best.
At 4:30 A mistake: step 3: When the file server gets the token, it "decrypts" (not "encrypts") the token with the secret key shared with TGS.
💯
I learnt so much from your VDOs that I can not explain. I wish I could learn more that I need to learn from you. Thank you.
Happy to hear that!
The most understandable explanation of Kerberos on entire Internet
Thanks a lot for your comment.
The best video on RUclips to know about Kerberos
Wow great explanation best explanation on RUclips
Many thanks.
No only on SONNY's Channel
I'm in a graduate course in networking and the explanation there was in the form of voluminous text explanation and a crappy graphic from Wikipedia (lame). This is a beautifully clear explanation that leaves no doubts in my mind about the process, or the objects/subjects involved - Thanks!
I paid for many udemy courses and books but this channel is the best. I wish he had some courses in udemy. This channel has very clean and on point explanation within mins. Other courses takes 20mins and you get even more confused..... Please create udemy courses!
Your explanation is genuinely very grasping and absorbing. Continue making more such videos
hand down the best explanation you can get anywhere. Thanks a lot for this.
I watched some videos on this topic but i was still confused but your explanation was very clear and easy to understand.. I’m so grateful thank you
been trying to fully wrap my head around Kerberos for a bit now. Love the call to greek mythos, and the video did an excellent job explaining! Thank you!!
Whenever stuck on any crypto topic Sunny is one point solution. You are awesome Sunny. Put more tech videos
Great video! However, there were 2 mistakes:
1) At 2:26, the request is encrypted with a HASH of the clients password, not the clients actual password (because that would mean that the Authentication Server is storing the clients password in plaintext, which is NOT GOOD - it instead stores a hash of the clients password)
2) At 4:32, it should be "decrypts the token" instead of "encrypts the token", because it's already been encrypted.
Other than that, great explanation. Very easy to understand!
True...even i was a bit skeptical about the point 1....
sorry i am just trying to understand a bit better. can you explain how the request is encrypted with a hash of the client's password??
I think you're right in your first point about this being wrong, but I don't think you're correct either. The initial request to the AS is completely plaintext. Please do correct me if you think I'm wrong.
I agree that the _response_ (including the TGS session key etc) from the AS would be encrypted using the hash of the client's password.
@@sb_4 the initial request is the client providing their credentials so that they can be authenticated. Why would that be in plaintext lol. Anyone would be able to sniff the traffic and obtain their credentials that way
@@doomedpepper8109 Because they just send their username, not their password (nor hashed password). There is no need to authenticate, aside from the Authentication Server checking that the user exists, because of the fact that the user can only decrypt the first response from the AS if they know their password / hashed password.
Simply the best explanation on the subject I've ever seen.
BEST Explanation! Thank you so much!!!
That's the clearest explanation of Kerberos that I've ever heard. Thank you, Sunny.
This is truly the best explanation on Kerberos that I have seen. Very easy to understand. Thank you!
Well, that was easy. Hands down, one of the best videos out there on the topic.
Thanks
I just love the way you say "This is Sunny" haha!! Yeah!! Your explanation is too brilliant. Keep going!!!
Its amazing within 6 minutes you can explain that topic that well...
This is the best explaination of the subject on youtube!
Sunny always the best. Every topic you cover, you give best shots. Thank you
A great intro to Kerberos: short, simple and to the point - thx!
The graphics animations and demonstrations are very good and very easy to understand.... I like it. Thank you so much.
Precise and best explanation before watching this video it is y difficult for me to understand this topic but now it's crystal clear.
u r the best // i wish all lecturers can emulate you . simple and plain
Very good explanation. Not confusing. Gives the essence of this mechanism. Thank you.
Best clear explanation I have seen in RUclips, huge thanks sir
Thank you for the explanation with zero fluff.
Professor. Very many thanks!!! Kerberos has so many parts and your easy to understand explanation made all thing scome together for me. I liked it and subscribed to your channel. Again, many thanks!
You are welcome! Thanks a lot for your encouragement!
great video! short, simple and very informative. Your videos really are helping me a lot in college. Greetings from Argentina!
I am glad my videos can be helpful. I love Argentina soccer team. There is an opera song called. "Don't cry for me, Argentina!" It is really great. Greetings from Kansas, USA.
the best explanation, clear and straight to the point
What a stunningly straight forward explanation, many thanks.
Thank you for watching!
What an excellent explanation! What didn't I watch this video years ago?!
Indeed after going through many videos, I find this explanation to be the best and easy to understand. Thanks a ton, you saved my day!! :)
You are welcome!
As a total newbie this helped me a lot. Thank you!
Sunny you are awesome, all of your videos are so clear and accurate. Thanks a lot!!
Many thanks for your encouragement. I will try my best.
Dawg. You explained that so well in such simple terms. Thank you brother!
Great explanation, thanks!! Taking my CISSP this week and was having such a hard time conceptualizing it.
Thanks a lot for watching.
Re-watched this a second time after a few days and now Get It. Thanks Sunny!
Dude this is the best video that I have seen. Awesome explanation.
When I heard him talk I almost stopped the video but I am glad I didn't because he explains Keberos authentication very well
Thank you for watching! I appreciate it!
Wonderful explanation. Good job Sunny Classroom
Thank you! 🙂
No better way to explain other than in very simple and straightforward & elaborative way..
Hi sir first of all thank u for your video..I have one question is that the Token from TGS is encrypted with the new secret key ,then once files server receives the Token that will be "encrypted or de-crypted" from the file server with the shared key which has been sent by TGS? 4:29...
De-crypted it is. It was my mistake.
good catch
Even i was confused for a while! Thanks.
Set the video speed to 1.25 and thank me later :) Nice explanation. Thanks a lot
Don't put unwanted comments, like speed. Slow learning is good for rememberence
sarathbab yes.. Sure you can use the slow learning approach.
I set it to 2x and it worked for me.
I remember better when I learn fast. If I learn slowly I get bored and lose track and forget everything. I watched lectures at 1x and 2x and then tried to write down what I remembered and had a much better recall when I watched at 2x.
@@adityamittal4357 probably because you already had watched it in 1x speed ;) lol
This is excellent explanation, thanks you so much for such a simple explanations. I was so confused before watching your video but now it is clear.
WHAH!? Why couldn't ANYONE ELSE explain this? Only Sunny. 你真棒! 厉害的老师.
Sir you explain so well in detail i like your teaching style thank you so much
You are welcome!
Thank you so much with the clear and consise explaination especially with the shared secret keys which i was confused about. Thank you once again sonny;
Best teacher.. Respect from nepal 🇳🇵🇳🇵
Many thanks!
Thats a very nice & precise high level explanation for Kerberos. Thank you .
You are welcome!
Crystal clear in 6 minutes, fantastic job!
Legendary explanation, we need more tutorials like this.
Not gonna lie, I usually avoid all video explanations with a presenter that has a strong accent, it really throws me off. I know it's really just my problem because everyone else doesn't seem to have an issue with it except me. The hardest for me are the ones with Indian accents, just can't do it. Anyways, for the longest time I would see the Sunny classroom videos and just ignore them, but the comments were always so positive I decided to give him a try and boy am I glad that I did. Even with the accent, you have such a great way of explaining things, you really make complex subjects easy to understand which is what a good teacher does. Thank you for making the videos!
Thank you very much, Moises, for your nice and encouraging words. I will do my best! I wish I could speak English better. Many thanks!
Moises, I have a remediation for you. You need to either go to India and learn English in their accents. Secondly try the same to practice with Indian people without going there. I have seen many of my American friends they understand Chinese or Indian accents 100%. It needs some patience, which we had to learn English.
I was reading kerberos in a book and couldn't understand what the idea was. Coming here I understood within the first 4 minutes.
I just love your videos, you help me pass my A+ with you perfect explanation and graphics. I feel bad for not paying for your work. Please create some form of a Chanel or upload all these videos on Udemy. You will be a great help to so many students!!!
Great explanation, simple yet connecting all the dots to understand the concept. Thank you!
You are welcome! Thanks a lot for your encouragement. I will do my best!
excellent explanation. very simplified though, without getting into the requests' structure, but all the elements are there. i think the best video for getting the basic understanding of how kerberos work.
There is also TGS SESSION KEY included at the first encounter as well as a HTTP SERVICE SESSION KEY at the second one, to ensure even more security
Victor Jozwicki I totally agree I think he said it wrong here, server should have decrypt it and encrypt it.
This is really great you just simplified a complex topic for me
Your examples and explanations are fantastic.
i just love the way you explain stuff.. its simple and awesome thanks sunny
Awesome explanation, I've been struggling a lot with Kerberos auth method, thanks for your vid!
Simple and shortest explanation about kerberos !!!!!!!!!!!!!
The best explanation that i ve ever viewed in youtube
Superb Explanation Sunny! All the rest I've seen was just confusing.
by far best example i have seen
Thanks a lot for your great comment.
This explanation is excellent. It's clear and easy to digest. Thanks!
I / We love you, Sunny! Your videos are well done and the explanations are on point every time, Sir! 💪
Thank you so much sunny sir to provide this video......with the help of this video I can write on examination paper very well.......so thank you so much
You are welcome!
this is the best explanation of kerberos . thanks so much🌟
Super! Really well explained. Concise, simple and easy to understand.
I've learned so much from your videos Sunny. Thanks a lot! More blessings to you.