mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 20:53:37 +00:00
Translated ['network-services-pentesting/pentesting-kerberos-88/README.m
This commit is contained in:
parent
bbd8a85974
commit
d19dcfa46b
1 changed files with 20 additions and 20 deletions
|
@ -1,33 +1,33 @@
|
|||
# 88tcp/udp - Kupima Udukuzi wa Kerberos
|
||||
# 88tcp/udp - Kupima Usalama wa Kerberos
|
||||
|
||||
<details>
|
||||
|
||||
<summary><strong>Jifunze udukuzi wa AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||||
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||||
|
||||
Njia nyingine za kusaidia HackTricks:
|
||||
|
||||
* Ikiwa unataka kuona **kampuni yako inayotangazwa katika HackTricks** au **kupakua HackTricks katika PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||||
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
|
||||
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
||||
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||||
* **Shiriki mbinu zako za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||||
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||||
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
|
||||
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
|
||||
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||||
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||||
|
||||
</details>
|
||||
|
||||
## Taarifa Msingi
|
||||
|
||||
**Kerberos** inafanya kazi kwa kanuni ambapo inathibitisha watumiaji bila kusimamia moja kwa moja ufikiaji wao kwa rasilimali. Hii ni tofauti muhimu kwa sababu inasisitiza jukumu la itifaki katika mifumo ya usalama.
|
||||
**Kerberos** inafanya kazi kwa msingi ambapo inauthentisha watumiaji bila kusimamia moja kwa moja upatikanaji wao wa rasilimali. Hii ni tofauti muhimu kwa sababu inasisitiza jukumu la itifaki katika mifumo ya usalama.
|
||||
|
||||
Katika mazingira kama **Active Directory**, **Kerberos** ni muhimu katika kuanzisha utambulisho wa watumiaji kwa kuthibitisha nywila zao za siri. Mchakato huu huhakikisha kuwa utambulisho wa kila mtumiaji unathibitishwa kabla ya kuingiliana na rasilimali za mtandao. Walakini, **Kerberos** haiongezi utendaji wake wa kutathmini au kutekeleza ruhusa ambazo mtumiaji anayo juu ya rasilimali au huduma maalum. Badala yake, inatoa njia salama ya kuthibitisha watumiaji, ambayo ni hatua muhimu sana katika mchakato wa usalama.
|
||||
Katika mazingira kama **Active Directory**, **Kerberos** ni muhimu katika kuanzisha utambulisho wa watumiaji kwa kuthibitisha nywila zao za siri. Mchakato huu unahakikisha kwamba utambulisho wa kila mtumiaji unathibitishwa kabla ya kuingiliana na rasilimali za mtandao. Walakini, **Kerberos** haitoi utendaji wake kuamua au kutekeleza ruhusa ambazo mtumiaji anayo juu ya rasilimali au huduma maalum. Badala yake, inatoa njia salama ya kuthibitisha watumiaji, ambayo ni hatua muhimu sana katika mchakato wa usalama.
|
||||
|
||||
Baada ya kuthibitishwa na **Kerberos**, mchakato wa kufanya maamuzi kuhusu ufikiaji wa rasilimali unatekelezwa na huduma binafsi ndani ya mtandao. Huduma hizi ndizo zinazohusika na kutathmini haki na ruhusa za mtumiaji aliye thibitishwa, kulingana na habari zinazotolewa na **Kerberos** kuhusu mamlaka ya mtumiaji. Muundo huu unaruhusu kugawanyika kwa majukumu kati ya kuthibitisha utambulisho wa watumiaji na kusimamia haki zao za ufikiaji, kuruhusu njia inayoweza kubadilika na salama zaidi ya usimamizi wa rasilimali katika mtandao uliogawanyika.
|
||||
Baada ya kuthibitishwa na **Kerberos**, mchakato wa kufanya maamuzi kuhusu upatikanaji wa rasilimali unatekelezwa na huduma binafsi ndani ya mtandao. Huduma hizi ndizo zinazohusika na kutathmini haki na ruhusa za mtumiaji aliyeathibitishwa, kulingana na habari iliyotolewa na **Kerberos** kuhusu mamlaka ya mtumiaji. Ubunifu huu unaruhusu kutenganisha masuala kati ya kuthibitisha utambulisho wa watumiaji na kusimamia haki zao za upatikanaji, ikiruhusu njia inayoweza kubadilika na salama zaidi ya usimamizi wa rasilimali katika mitandao iliyosambazwa.
|
||||
|
||||
**Bandari ya Chaguo:** 88/tcp/udp
|
||||
**Bandari ya Default:** 88/tcp/udp
|
||||
```
|
||||
PORT STATE SERVICE
|
||||
88/tcp open kerberos-sec
|
||||
```
|
||||
### **Ili kujifunza jinsi ya kutumia Kerberos vibaya, unapaswa kusoma chapisho kuhusu** [**Active Directory**](../../windows-hardening/active-directory-methodology/)**.**
|
||||
### **Ili kujifunza jinsi ya kutumia Kerberos unapaswa kusoma chapisho kuhusu** [**Active Directory**](../../windows-hardening/active-directory-methodology/)**.**
|
||||
|
||||
## Zaidi
|
||||
|
||||
|
@ -37,7 +37,7 @@ PORT STATE SERVICE
|
|||
|
||||
### MS14-068
|
||||
|
||||
Kosa la MS14-068 linaruhusu mtu kudukua alama ya kuingia ya Kerberos ya mtumiaji halali ili kudai vibali vilivyoinuliwa, kama kuwa Domain Admin. Dai hili bandia linathibitishwa kimakosa na Domain Controller, kuruhusu ufikiaji usiohalali kwa rasilimali za mtandao katika msitu wa Active Directory.
|
||||
Kosa la MS14-068 inaruhusu mshambuliaji kuhariri ishara ya kuingia ya Kerberos ya mtumiaji halali kudai vibali vilivyoinuliwa kwa uwongo, kama kuwa Msimamizi wa Kikoa. Dai hili bandia linathibitishwa kimakosa na Msimamizi wa Kikoa, kuruhusu ufikiaji usioruhusiwa kwa rasilimali za mtandao kote msituni wa Active Directory.
|
||||
|
||||
{% embed url="https://adsecurity.org/?p=541" %}
|
||||
|
||||
|
@ -66,7 +66,7 @@ Command: nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm
|
|||
Entry_3:
|
||||
Name: With Usernames
|
||||
Description: Brute Force with Usernames and Passwords
|
||||
Note: consider git clonehttps://github.com/ropnop/kerbrute.git ./kerbrute -h
|
||||
Note: consider git clone https://github.com/ropnop/kerbrute.git ./kerbrute -h
|
||||
|
||||
Entry_4:
|
||||
Name: With Creds
|
||||
|
@ -75,14 +75,14 @@ Command: GetUserSPNs.py -request -dc-ip {IP} active.htb/svc_tgs
|
|||
```
|
||||
<details>
|
||||
|
||||
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||||
<summary><strong>Jifunze AWS hacking kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)</strong></a><strong>!</strong></summary>
|
||||
|
||||
Njia nyingine za kusaidia HackTricks:
|
||||
|
||||
* Ikiwa unataka kuona **kampuni yako ikionekana kwenye HackTricks** au **kupakua HackTricks kwa muundo wa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||||
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
|
||||
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) ya kipekee
|
||||
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||||
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwenye** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||||
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
||||
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
|
||||
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
||||
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
||||
* **Shiriki mbinu zako za kuhack kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
||||
|
||||
</details>
|
||||
|
|
Loading…
Reference in a new issue