On 01/20/2015 12:08 AM, Zaid Arafeh wrote:
> My questions are
> 1- are there structural differences between MS tickets and MIT tickets?
The tickets themselves are in the same format, defined by RFC 4120. But
they are stored in different ways. MIT krb5 generally stores tickets in
a FILE ccache, w
t; From: ka...@mit.edu
> To: zara...@live.com
> CC: ghud...@mit.edu; kerberos@MIT.EDU
> Subject: RE: NT hashes in krb5
>
> On Mon, 19 Jan 2015, Zaid Arafeh wrote:
>
> > If I have the K/M key (which is in the database) and I have the password
> > for the master key, w
On Mon, 19 Jan 2015, Zaid Arafeh wrote:
> If I have the K/M key (which is in the database) and I have the password
> for the master key, would that make extracting hashes from the database
> easier? I looked at the keytab file (thnx) , unfortunately keytab files
> usually don't store the krbtgt ke
s?
Thanks!
From: Greg Hudson<mailto:ghud...@mit.edu>
Sent: 19/01/2015 01:17 PM
To: zara...@live.com<mailto:zara...@live.com>;
kerberos@mit.edu<mailto:kerberos@mit.edu>
Subject: Re: NT hashes in krb5
On 01/19/2015 02:24 AM, Zaid Arafeh wrote:
> If I have the K/M key (which
On 01/19/2015 02:24 AM, Zaid Arafeh wrote:
> If I have the K/M key (which is in the database) and I have the password
> for the master key, would that make extracting hashes from the database
> easier?
It is possible but not convenient; you would have to write code to do
the decryption.
> I looke
g for )
> Date: Mon, 19 Jan 2015 01:02:59 -0500
> From: ghud...@mit.edu
> To: zara...@live.com; kerberos@mit.edu
> Subject: Re: NT hashes in krb5
>
> I'm removing kfwdev from the CC list as there is nothing specific to
> Kerberos for Windows about the question.
>
>
I'm removing kfwdev from the CC list as there is nothing specific to
Kerberos for Windows about the question.
On 01/18/2015 08:10 PM, Zaid Arafeh wrote:
> Here's the scenario. I am trying to get krb5 to use an NT hash. NT hash is
> merely the MD4 computation of the UTC-16LE of the password string
Hello folks,
Continuing on with my little project here, I have another question. my project
is demonstrate a hash based attack for interoperability between Windows and
Linux. (if anyone is interested in learning more we can have a conversation
off-line so we don't flood the thread for everyone)