Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Decrypting a kerberos master database
From: Darren Reed <avalon () caligula anu edu au>
Date: Thu, 25 Mar 2004 12:07:55 +1100 (Australia/ACT)

In some mail from Richard Massa, sie said:

Hey all,

I'm looking for information on decrypting a kerberos database.  Basically, I
want to follow the steps a hacker would use to obtain passwords in the event
of a root compromise of a master KDC.  Googling doesn't seem to turn up
much, but maybe I'm not entering in the right keywords...

Find out where the encryption is kept so that it can boot unattended.

For MIT Kerberos, this is the stash file (/.k5.* is normal.)

A properly secured KDC (master or slave) does nothing else aside
from handle KDC requests, including no remote ssh.


Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]