This alignment with Microsoft is not documented and perhaps specifically designed to prevent attackers from taking advantage of it.
As far as I know, this usually happens at the TCP level, with a special token generated by the user credentials and transmitted along with the request. It is intercepted by the Windows security channel and authenticates against AD.
This token is used as a key (or as a basis for generating a key) for encrypting communications.
I think that if you look at the TCP packet, you should see the token, although I have never seen it.
Aliostad
source share