hacktricks/network-services-pentesting/pentesting-kerberos-88
2024-02-08 22:20:49 +00:00
..
harvesting-tickets-from-linux.md Translated ['mobile-pentesting/android-app-pentesting/README.md', 'mobil 2024-02-08 04:42:06 +00:00
harvesting-tickets-from-windows.md Translated ['a.i.-exploiting/bra.i.nsmasher-presentation/BIM_Bruteforcer 2024-02-08 22:20:49 +00:00
README.md Translated ['a.i.-exploiting/bra.i.nsmasher-presentation/BIM_Bruteforcer 2024-02-08 22:20:49 +00:00

88tcp/udp - 渗透测试 Kerberos

从零开始学习 AWS 黑客技术,成为专家 htARTEHackTricks AWS 红队专家)

支持 HackTricks 的其他方式:

基本信息

Kerberos 的运作原理是在不直接管理用户对资源的访问权限的情况下对用户进行身份验证。这是一个重要的区别,因为它强调了该协议在安全框架中的作用。

在像 Active Directory 这样的环境中,Kerberos 在通过验证用户的秘密密码来建立用户身份方面起着关键作用。该过程确保在用户与网络资源交互之前,每个用户的身份都得到确认。然而,Kerberos 并不扩展其功能以评估或强制用户对特定资源或服务的权限。相反,它提供了一种安全的用户身份验证方式,这是安全过程中的关键第一步。

Kerberos 进行身份验证后,关于对资源的访问权限的决策过程被委托给网络中的各个服务。然后,这些服务负责根据 Kerberos 提供的关于用户权限的信息评估经过身份验证的用户的权限和访问权限。这种设计允许在分布式网络中对资源管理采用更灵活和安全的方法,实现了对用户身份进行身份验证和管理其访问权限之间的关注点分离。

默认端口: 88/tcp/udp

PORT   STATE SERVICE
88/tcp open  kerberos-sec

要学习如何滥用Kerberos您应该阅读有关 Active Directory** 的文章。**

更多

Shodan

  • port:88 kerberos

MS14-068

MS14-068漏洞允许攻击者篡改合法用户的Kerberos登录令牌以虚假地声称拥有提升的特权比如成为域管理员。域控制器错误地验证了这个伪造的声明从而使未经授权的访问跨越Active Directory林中的网络资源成为可能。

{% embed url="https://adsecurity.org/?p=541" %}

其他利用:https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS14-068/pykek

HackTricks自动命令

Protocol_Name: Kerberos    #Protocol Abbreviation if there is one.
Port_Number:  88   #Comma separated if there is more than one.
Protocol_Description: AD Domain Authentication         #Protocol Abbreviation Spelled out

Entry_1:
Name: Notes
Description: Notes for Kerberos
Note: |
Kerberos operates on a principle where it authenticates users without directly managing their access to resources. This is an important distinction because it underlines the protocol's role in security frameworks.
In environments like **Active Directory**, Kerberos is instrumental in establishing the identity of users by validating their secret passwords. This process ensures that each user's identity is confirmed before they interact with network resources. However, Kerberos does not extend its functionality to evaluate or enforce the permissions a user has over specific resources or services. Instead, it provides a secure way of authenticating users, which is a critical first step in the security process.

https://book.hacktricks.xyz/pentesting/pentesting-kerberos-88

Entry_2:
Name: Pre-Creds
Description: Brute Force to get Usernames
Command: nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm="{Domain_Name}",userdb={Big_Userlist} {IP}

Entry_3:
Name: With Usernames
Description: Brute Force with Usernames and Passwords
Note: consider git clonehttps://github.com/ropnop/kerbrute.git ./kerbrute -h

Entry_4:
Name: With Creds
Description: Attempt to get a list of user service principal names
Command: GetUserSPNs.py -request -dc-ip {IP} active.htb/svc_tgs
从零开始学习AWS黑客技术成为专家 htARTEHackTricks AWS红队专家

其他支持HackTricks的方式