![Share on Facebook Facebook](https://www.system-center.me/wp-content/plugins/social-media-feather/synved-social/image/social/regular/48x48/facebook.png)
![Share on Twitter twitter](https://www.system-center.me/wp-content/plugins/social-media-feather/synved-social/image/social/regular/48x48/twitter.png)
![Share on Reddit reddit](https://www.system-center.me/wp-content/plugins/social-media-feather/synved-social/image/social/regular/48x48/reddit.png)
![Pin it with Pinterest pinterest](https://www.system-center.me/wp-content/plugins/social-media-feather/synved-social/image/social/regular/48x48/pinterest.png)
![Share on Linkedin linkedin](https://www.system-center.me/wp-content/plugins/social-media-feather/synved-social/image/social/regular/48x48/linkedin.png)
![Share by email mail](https://www.system-center.me/wp-content/plugins/social-media-feather/synved-social/image/social/regular/48x48/mail.png)
It’s just a week after a major security breach has been found in Active Directory Secure Channel mechanism (MS14-066, CVE-2014-6321) , and now, one more is joining the party –
More could be read in a post I uploaded to my company blog – Vulnerability in Kerberos Allow Elevation of Privilege
Update (8/12/14):
PoC is available for that vulnerability, it documented here.
The python script file could be downloaded here under the title “Python Kerberos Exploitation Kit”.