Penetration Testing mailing list archives

RE: Sniffing a windows domain authentication


From: "Andy Meyers" <andy.meyers () hushmail com>
Date: Thu, 16 Mar 2006 20:22:05 -0800

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

KerbSniff and KerbCrack should do the trick.

http://ntsecurity.nu/toolbox/kerbcrack/

Ashes

- -----Original Message-----
From: l00t3r [mailto:l00t3r () gmail com]
Sent: Thursday, March 16, 2006 3:43 PM
To: spambox () barrossecurity com
Cc: pen-test () securityfocus com
Subject: Re: Sniffing a windows domain authentication

LC5 might do what your looking for.  I know they have an option to import
network sniffer files but not sure if it will actually crack what your
looking to do.  Might be worth looking into.

Ryan

On 16 Mar 2006 16:32:32 -0000, spambox () barrossecurity com
<spambox () barrossecurity com> wrote:
Hello list!
Sometime ago I was wondering if it is possible to
capture the authentication packets sent from a Windows Workstation to the
PDC and then crack the password. I've setup this scenario in the lab
environment and sniffer these packets, but did'n find any referece about
cracking the password.. Any   one knows how the authentication works, and
if it can be broken??

best regards

Carlos Barros
http://www.barrossecurity.com/

----------------------------------------------------------------------
--------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security
penetration testing and vulnerability management needs. You have an
option to go with a managed service (Cenzic ClickToSecure) or an
enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm
your results from other product. Contact us at request () cenzic com
----------------------------------------------------------------------
--------



-
----------------------------------------------------------------------------
- --
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to
proactively protect your applications from hackers. Cenzic has the most
comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic
Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com
-
----------------------------------------------------------------------------
- --


-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify/
Version: Hush 2.4

wkYEARECAAYFAkQaOWwACgkQnZu7yPmLRpDowgCeI63Kd/wPwam0eByIVKG9lJ0u5OgA
niR9++HDWu4A0lSofxJzWXoCJoPt
=iyr0
-----END PGP SIGNATURE-----



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: