Full Disclosure mailing list archives
Re: Decrypting a kerberos master database
From: Darren Reed <avalon () caligula anu edu au>
Date: Thu, 25 Mar 2004 12:07:55 +1100 (Australia/ACT)
In some mail from Richard Massa, sie said:
Hey all, I'm looking for information on decrypting a kerberos database. Basically, I want to follow the steps a hacker would use to obtain passwords in the event of a root compromise of a master KDC. Googling doesn't seem to turn up much, but maybe I'm not entering in the right keywords...
Find out where the encryption is kept so that it can boot unattended. For MIT Kerberos, this is the stash file (/.k5.* is normal.) A properly secured KDC (master or slave) does nothing else aside from handle KDC requests, including no remote ssh. Darren _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Decrypting a kerberos master database Richard Massa (Mar 23)
- Re: Decrypting a kerberos master database Telefónica Deutschland (Mar 24)
- Re: Decrypting a kerberos master database Darren Reed (Mar 24)