Defending against attacks: Simulation and working of Kerberos protocol for mutual authentication
Procedure
The experiment simulates the working of the Kerberos protocol.
Begin by selecting the source client/server and then a destination client/server, highlighted in red and blue respectively.
After choosing the source and target computers, choose the label of the line and click on Create Line to draw the line.
Choose the options and computers in the right order to complete the experiment.
To begin the authentication process, the client asks for a Ticket Granting Ticket from the Authentication Server housed inside the Key Distribution Center.
Identify the right sequence of actions from the theory section and perform the experiment.
After all lines are drawn, click on the Verify button to check your answer.