[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Decrypting a kerberos master database
- To: rmassa@xxxxxxxxxxxxx (Richard Massa)
- Subject: Re: [Full-Disclosure] Decrypting a kerberos master database
- From: Darren Reed <avalon@xxxxxxxxxxxxxxxxxxx>
- Date: Thu, 25 Mar 2004 12:07:55 +1100 (Australia/ACT)
In some mail from Richard Massa, sie said:
>
> Hey all,
>
> I'm looking for information on decrypting a kerberos database. Basically, I
> want to follow the steps a hacker would use to obtain passwords in the event
> of a root compromise of a master KDC. Googling doesn't seem to turn up
> much, but maybe I'm not entering in the right keywords...
Find out where the encryption is kept so that it can boot unattended.
For MIT Kerberos, this is the stash file (/.k5.* is normal.)
A properly secured KDC (master or slave) does nothing else aside
from handle KDC requests, including no remote ssh.
Darren
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html