In order to authenticate to the system, the attacker had to first inject . controller to authenticate each client; with Kerberos, a server can .. support for the various flavors of Windows [Ochoa 2008, March 6]. .. 2003 provides the minimum requirements for the migration plan. . were updated within a day of the scan date.