This chapter we will continue our discussion on authentication applications and more precisely we will talk about kerberos in detail. kerberos versions, threats and vulnerabilities will also be discussed. | Lecture Network security Chapter 25 - Dr. Munam Ali Shah