mailing list archives
Re: Decrypting a kerberos master database
From: Darren Reed <avalon () caligula anu edu au>
Date: Thu, 25 Mar 2004 12:07:55 +1100 (Australia/ACT)
In some mail from Richard Massa, sie said:
I'm looking for information on decrypting a kerberos database. Basically, I
want to follow the steps a hacker would use to obtain passwords in the event
of a root compromise of a master KDC. Googling doesn't seem to turn up
much, but maybe I'm not entering in the right keywords...
Find out where the encryption is kept so that it can boot unattended.
For MIT Kerberos, this is the stash file (/.k5.* is normal.)
A properly secured KDC (master or slave) does nothing else aside
from handle KDC requests, including no remote ssh.
Full-Disclosure - We believe in it.