[rwth-security] Kerberos (II): How to attack Kerberos?