Malware and Kerberos Authentication
Could malware use the active Kerberos ticket on the system to authenticate with AD and then proceed to successfully call the CnC server through the HTTP proxy on the same environment?
Collaborate Disseminate
Could malware use the active Kerberos ticket on the system to authenticate with AD and then proceed to successfully call the CnC server through the HTTP proxy on the same environment?
In a lecture, I learned that with Kerberos, one can have one master KDC and several slave KDCs. One slide says:
- Synchronisierung der read-only Slaves
- Periodisch oder per Administrations-Kommando
- „Klartext-Übertragung“ mit anschließendem kryptographischen Hash
- Master-Secrets der Clients verschlüsselt mit KDC Master-Secret
- Hash zum Schutz vor Manipulation, Vertauschen, Anfügen von Daten
which translated to English means:
- synchronization of the read-only slaves
- periodical or via administrative command
- “plaintext transmission” with subsequent cryptographic hash
- master secrets of the clients encrypted with KDC master secret
- hash for protection from manipulation, permutation, appendage of data
Unfortunately, I wasn’t able to find additional information about this online.
My first question is what exactly they mean when they say “plaintext transmission” because right below it, it says that the master secrets are encrypted.
My second question is how the hash offers protection from manipulation, permutation, and appendage of data. Is the hash itself encrypted with the KDC master secret? It the hash performed over the plaintext data?
Continue reading Security of key distribution to KDC slaves in Kerberos
I am running (as sudo) a script for setting up Kerberos (which I will paste below) on a CentOS machine (in a Cloudera Quickstart Docker container).
The strange thing is that I have successfully ran this script many many times… Continue reading Kerberos: kadmin.local: No such file or directory while initializing kadmin.local interface (cloudera quickstart)
Windows Active Directory is based on Kerberos and LDAP. When authenticating via the Domain Controller, how does my endpoint know that it’s really speaking to the DC?
Likewise, AD can be used to authenticate for services hos… Continue reading Windows Active Directory: How do endpoints authenticate the Domain Controller?
I have krb5.conf that looks like
kdc=server1
kdc=server2
kdc=server3
kdc=server4
master_kdc=server1
master_kdc=server2
master_kdc=server3
master_kdc=server4
admin_server=server1
admin_server=server2
admin_server=server3
adm… Continue reading krb5.conf failover not working [on hold]
From how the “Orpheus’ Lyre” bug got its weird name all the way to what we can learn from it. No jargon, just plain English. Enjoy… Continue reading “Orpheus’ Lyre” – where it came from, and what to do [VIDEO]
A long-standing bug in the network authentication protocol called Kerberos led to a security hole in Windows, Linux and more. Continue reading Windows security hole – the “Orpheus’ Lyre” attack explained
In my company, we configure SAML2 SSO for all applications, but I have a problem with an application that not support SAML2 but only Kerberos.
How can I create a workaround?
Kerberos supports different ways (ccache types) of storing tickets, such as:
FILE
MEMORY
KEYRING
I was wondering whether it would technically be possible to also store the Ticket-granting-ticket and service ticket in a Yu… Continue reading Would it be possible to store Kerberos tickets on a YubiKey?
According to my understanding of Kerberos, a client is supposed to only enter its password once for obtaining the TGT from the Kerberos server and the authentication against the web services (f.e. SSH, Apache, SMB …) is onl… Continue reading Is MIT Kerberos supposed to ask for a password when authenticating to SSH?