Kerberos Authentication Spoofing: Don’t Bypass the Spec
The authentication protocols used by security systems must be flawless. But there’s no such thing as a flawless system, and implementation errors can lead to hazardous security vulnerabilities.