hacktricks/network-services-pentesting/pentesting-kerberos-88
2024-02-05 02:56:36 +00:00
..
harvesting-tickets-from-linux.md Translated ['forensics/basic-forensic-methodology/partitions-file-system 2024-02-05 02:56:36 +00:00
harvesting-tickets-from-windows.md Translated ['forensics/basic-forensic-methodology/partitions-file-system 2024-02-05 02:56:36 +00:00
README.md Translated ['network-services-pentesting/1521-1522-1529-pentesting-oracl 2024-01-05 23:28:30 +00:00

88tcp/udp - 对 Kerberos 的渗透测试

从零开始学习 AWS 黑客攻击直到成为专家 htARTE (HackTricks AWS 红队专家)

支持 HackTricks 的其他方式:

基本信息

首先Kerberos 是一种认证协议,而不是授权协议。换句话说,它允许识别每个用户,用户提供一个秘密密码,但它不验证用户可以访问哪些资源或服务。
Kerberos 在 Active Directory 中使用。在这个平台中Kerberos 提供有关每个用户权限的信息,但每个服务有责任确定用户是否可以访问其资源。

默认端口: 88/tcp/udp

PORT   STATE SERVICE
88/tcp open  kerberos-sec

要了解如何滥用Kerberos您应该阅读有关 Active Directory的文章。

更多信息

Shodan

  • port:88 kerberos

MS14-068

简单来说这个漏洞允许攻击者修改一个现有的、有效的、域用户登录令牌Kerberos Ticket Granting TicketTGT票据通过添加虚假声明即用户是Domain Admins或其他敏感组的成员域控制器DC将验证那个虚假的声明使攻击者能够不当地访问网络上任何域在AD森林中的资源。

{% embed url="https://adsecurity.org/?p=541" %}

其他漏洞利用工具: https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS14-068/pykek

HackTricks 自动命令

Protocol_Name: Kerberos    #Protocol Abbreviation if there is one.
Port_Number:  88   #Comma separated if there is more than one.
Protocol_Description: AD Domain Authentication         #Protocol Abbreviation Spelled out

Entry_1:
Name: Notes
Description: Notes for Kerberos
Note: |
Firstly, Kerberos is an authentication protocol, not authorization. In other words, it allows to identify each user, who provides a secret password, however, it does not validates to which resources or services can this user access.
Kerberos is used in Active Directory. In this platform, Kerberos provides information about the privileges of each user, but it is the responsability of each service to determine if the user has access to its resources.

https://book.hacktricks.xyz/pentesting/pentesting-kerberos-88

Entry_2:
Name: Pre-Creds
Description: Brute Force to get Usernames
Command: nmap -p 88 --script=krb5-enum-users --script-args krb5-enum-users.realm="{Domain_Name}",userdb={Big_Userlist} {IP}

Entry_3:
Name: With Usernames
Description: Brute Force with Usernames and Passwords
Note: consider git clonehttps://github.com/ropnop/kerbrute.git ./kerbrute -h

Entry_4:
Name: With Creds
Description: Attempt to get a list of user service principal names
Command: GetUserSPNs.py -request -dc-ip {IP} active.htb/svc_tgs
从零开始学习AWS黑客攻击直至成为专家通过 htARTE (HackTricks AWS Red Team Expert)!

支持HackTricks的其他方式: