lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200403250107.i2P17tgd028110@caligula.anu.edu.au> From: avalon at caligula.anu.edu.au (Darren Reed) Subject: Decrypting a kerberos master database In some mail from Richard Massa, sie said: > > Hey all, > > I'm looking for information on decrypting a kerberos database. Basically, I > want to follow the steps a hacker would use to obtain passwords in the event > of a root compromise of a master KDC. Googling doesn't seem to turn up > much, but maybe I'm not entering in the right keywords... Find out where the encryption is kept so that it can boot unattended. For MIT Kerberos, this is the stash file (/.k5.* is normal.) A properly secured KDC (master or slave) does nothing else aside from handle KDC requests, including no remote ssh. Darren
Powered by blists - more mailing lists