Kak worm, 46
Kerbcrack program, 170–171
Kerberos authentication package, 159
Kerberos authentication protocol
attack tools for, 170–171
definition of, 154–156
group policy settings for, 494
limitations of, 157
Kerberos Authentication Service (AS) exchange, 155
Kerberos Client/Server exchange (Application Exchange), 156
Kerberos Key Distribution Center service, 273, 287
Kerberos Network Monitor, 156
Kerberos Ticket Granting Service (TGS) exchange, 155–156
Kerbsniff program, 170–171
Key Archival and Management in Windows Server 2003, 478
.key files, 201, 248
keystroke logging hardware, 166
keystroke logging trojans, 165
Klist utility, 156
"Know Thy Enemy" strategy (Sun Tzu), 3
Konqueror browser, 350
KRA (Key Recovery Agent), 74, 475–476
Krbtgt account, 101
Krbtray utility, 156