mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 22:18:27 +00:00
Translated ['network-services-pentesting/pentesting-kerberos-88/README.m
This commit is contained in:
parent
bbd8a85974
commit
d19dcfa46b
1 changed files with 20 additions and 20 deletions
|
@ -1,33 +1,33 @@
|
||||||
# 88tcp/udp - Kupima Udukuzi wa Kerberos
|
# 88tcp/udp - Kupima Usalama wa Kerberos
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
|
|
||||||
<summary><strong>Jifunze udukuzi wa AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||||||
|
|
||||||
Njia nyingine za kusaidia HackTricks:
|
Njia nyingine za kusaidia HackTricks:
|
||||||
|
|
||||||
* Ikiwa unataka kuona **kampuni yako inayotangazwa katika HackTricks** au **kupakua HackTricks katika PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||||||
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
|
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
|
||||||
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
|
||||||
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||||||
* **Shiriki mbinu zako za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
## Taarifa Msingi
|
## Taarifa Msingi
|
||||||
|
|
||||||
**Kerberos** inafanya kazi kwa kanuni ambapo inathibitisha watumiaji bila kusimamia moja kwa moja ufikiaji wao kwa rasilimali. Hii ni tofauti muhimu kwa sababu inasisitiza jukumu la itifaki katika mifumo ya usalama.
|
**Kerberos** inafanya kazi kwa msingi ambapo inauthentisha watumiaji bila kusimamia moja kwa moja upatikanaji wao wa rasilimali. Hii ni tofauti muhimu kwa sababu inasisitiza jukumu la itifaki katika mifumo ya usalama.
|
||||||
|
|
||||||
Katika mazingira kama **Active Directory**, **Kerberos** ni muhimu katika kuanzisha utambulisho wa watumiaji kwa kuthibitisha nywila zao za siri. Mchakato huu huhakikisha kuwa utambulisho wa kila mtumiaji unathibitishwa kabla ya kuingiliana na rasilimali za mtandao. Walakini, **Kerberos** haiongezi utendaji wake wa kutathmini au kutekeleza ruhusa ambazo mtumiaji anayo juu ya rasilimali au huduma maalum. Badala yake, inatoa njia salama ya kuthibitisha watumiaji, ambayo ni hatua muhimu sana katika mchakato wa usalama.
|
Katika mazingira kama **Active Directory**, **Kerberos** ni muhimu katika kuanzisha utambulisho wa watumiaji kwa kuthibitisha nywila zao za siri. Mchakato huu unahakikisha kwamba utambulisho wa kila mtumiaji unathibitishwa kabla ya kuingiliana na rasilimali za mtandao. Walakini, **Kerberos** haitoi utendaji wake kuamua au kutekeleza ruhusa ambazo mtumiaji anayo juu ya rasilimali au huduma maalum. Badala yake, inatoa njia salama ya kuthibitisha watumiaji, ambayo ni hatua muhimu sana katika mchakato wa usalama.
|
||||||
|
|
||||||
Baada ya kuthibitishwa na **Kerberos**, mchakato wa kufanya maamuzi kuhusu ufikiaji wa rasilimali unatekelezwa na huduma binafsi ndani ya mtandao. Huduma hizi ndizo zinazohusika na kutathmini haki na ruhusa za mtumiaji aliye thibitishwa, kulingana na habari zinazotolewa na **Kerberos** kuhusu mamlaka ya mtumiaji. Muundo huu unaruhusu kugawanyika kwa majukumu kati ya kuthibitisha utambulisho wa watumiaji na kusimamia haki zao za ufikiaji, kuruhusu njia inayoweza kubadilika na salama zaidi ya usimamizi wa rasilimali katika mtandao uliogawanyika.
|
Baada ya kuthibitishwa na **Kerberos**, mchakato wa kufanya maamuzi kuhusu upatikanaji wa rasilimali unatekelezwa na huduma binafsi ndani ya mtandao. Huduma hizi ndizo zinazohusika na kutathmini haki na ruhusa za mtumiaji aliyeathibitishwa, kulingana na habari iliyotolewa na **Kerberos** kuhusu mamlaka ya mtumiaji. Ubunifu huu unaruhusu kutenganisha masuala kati ya kuthibitisha utambulisho wa watumiaji na kusimamia haki zao za upatikanaji, ikiruhusu njia inayoweza kubadilika na salama zaidi ya usimamizi wa rasilimali katika mitandao iliyosambazwa.
|
||||||
|
|
||||||
**Bandari ya Chaguo:** 88/tcp/udp
|
**Bandari ya Default:** 88/tcp/udp
|
||||||
```
|
```
|
||||||
PORT STATE SERVICE
|
PORT STATE SERVICE
|
||||||
88/tcp open kerberos-sec
|
88/tcp open kerberos-sec
|
||||||
```
|
```
|
||||||
### **Ili kujifunza jinsi ya kutumia Kerberos vibaya, unapaswa kusoma chapisho kuhusu** [**Active Directory**](../../windows-hardening/active-directory-methodology/)**.**
|
### **Ili kujifunza jinsi ya kutumia Kerberos unapaswa kusoma chapisho kuhusu** [**Active Directory**](../../windows-hardening/active-directory-methodology/)**.**
|
||||||
|
|
||||||
## Zaidi
|
## Zaidi
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ PORT STATE SERVICE
|
||||||
|
|
||||||
### MS14-068
|
### MS14-068
|
||||||
|
|
||||||
Kosa la MS14-068 linaruhusu mtu kudukua alama ya kuingia ya Kerberos ya mtumiaji halali ili kudai vibali vilivyoinuliwa, kama kuwa Domain Admin. Dai hili bandia linathibitishwa kimakosa na Domain Controller, kuruhusu ufikiaji usiohalali kwa rasilimali za mtandao katika msitu wa Active Directory.
|
Kosa la MS14-068 inaruhusu mshambuliaji kuhariri ishara ya kuingia ya Kerberos ya mtumiaji halali kudai vibali vilivyoinuliwa kwa uwongo, kama kuwa Msimamizi wa Kikoa. Dai hili bandia linathibitishwa kimakosa na Msimamizi wa Kikoa, kuruhusu ufikiaji usioruhusiwa kwa rasilimali za mtandao kote msituni wa Active Directory.
|
||||||
|
|
||||||
{% embed url="https://adsecurity.org/?p=541" %}
|
{% embed url="https://adsecurity.org/?p=541" %}
|
||||||
|
|
||||||
|
@ -66,7 +66,7 @@ Command: nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm
|
||||||
Entry_3:
|
Entry_3:
|
||||||
Name: With Usernames
|
Name: With Usernames
|
||||||
Description: Brute Force with Usernames and Passwords
|
Description: Brute Force with Usernames and Passwords
|
||||||
Note: consider git clonehttps://github.com/ropnop/kerbrute.git ./kerbrute -h
|
Note: consider git clone https://github.com/ropnop/kerbrute.git ./kerbrute -h
|
||||||
|
|
||||||
Entry_4:
|
Entry_4:
|
||||||
Name: With Creds
|
Name: With Creds
|
||||||
|
@ -75,14 +75,14 @@ Command: GetUserSPNs.py -request -dc-ip {IP} active.htb/svc_tgs
|
||||||
```
|
```
|
||||||
<details>
|
<details>
|
||||||
|
|
||||||
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
<summary><strong>Jifunze AWS hacking kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||||||
|
|
||||||
Njia nyingine za kusaidia HackTricks:
|
Njia nyingine za kusaidia HackTricks:
|
||||||
|
|
||||||
* Ikiwa unataka kuona **kampuni yako ikionekana kwenye HackTricks** au **kupakua HackTricks kwa muundo wa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||||||
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
|
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
|
||||||
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
|
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
||||||
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||||||
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwenye** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
* **Shiriki mbinu zako za kuhack kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
|
|
Loading…
Add table
Reference in a new issue