10 Flashcards
___________ is the primary authentication package used in Windows Domain (Active Directory) enviroments. It is implemented via two .dll files. on the client side ________ enables secure communication and authentication with __________ on the server side.
uses port _________ to communicate between client and server machines
Kerberos
kerberos.dll
kdcsvc.dll
88 TCP and UDP
What are the four advantages of Kerberos and it’s one major weakness?
FMSSU
Provides faster authentication using a ticketing system
Supports mutual authentication
Provides single sign-on between Active Directory systems
Relies on a simpler and faster symmetric keying algortithim
Secret keys are temporarily stored on user’s workstation
Kerbros functionality terms
________ Domain controllers act as _____. The LSA usses kdcsvc.dll to provide two main services, Authenication service and Ticket GRanting Service
_________ The collection of computer/accounts secured by the KDC. In windows the ________ is the same as the domain
______________ is responsible for verifying the validity of teh client computer and the user
_________ serves as the users proof taht they provided the correct credentials during their intital login
___________ is responsible for issuing Service Tickets
_____ is verified by a resource provider to allow a user to access a specific resources
_________ is the account used by the KDC
_____________ is the password hash of the user attempting to login. Additional keys are generated during the exchanges
(KDC) Key Distribution Centers
Realm
(AS) Authentication Service
(TGT) Ticket Granting Ticket
(TGS) Ticket Granting Services
(ST) Service Ticket
Krbtgt account
(SK) Session Key
What is the process of Kerberos traffic?
Client/TGS SK - encrypted using the secret key of the user.
The client sends a clear text “request to authenticate” message to the AS of the KDC.
TGT - encrypted using the secret key of the Kerberos account (krbtgt).
An ST, which contains a copy of the Client/Server SK, encrypted with
the specific service’s (i.e., print server) secret key.
The first message includes the encrypted TGT (used to prove authentication) and the identity of the requested service.
The second message is an authenticator (typically the client identity and a timestamp) encrypted with the SK.
The encrypted ST received previously
Client/Server SK - encrypted with the Client/TGS SK.
A new authenticator, encrypted using the Client/Server SK.
The server retrieves the timestamp from the authenticator and sends it
back to the client, encrypting it with the Client/Server SK. This provides the
mutual authentication portion of the exchange.
Message 1
The client sends a clear text “request to authenticate” message to the AS of the KDC.
Message 2
Client/TGS SK - encrypted using the secret key of the user.
Message 3
TGT - encrypted using the secret key of the Kerberos account (krbtgt).
Message 4
The first message includes the encrypted TGT (used to prove authentication) and the identity of the requested service.
Message 5
The second message is an authenticator (typically the client identity and a timestamp) encrypted with the SK.
Message 6
An ST, which contains a copy of the Client/Server SK, encrypted with
the specific service’s (i.e., print server) secret key.
Message 7
Client/Server SK - encrypted with the Client/TGS SK.
Additional service tickets after Logon
Message 6a
The encrypted ST received previously
Message 8
A new authenticator, encrypted using the Client/Server SK.
Message 9
The server retrieves the timestamp from the authenticator and sends it
back to the client, encrypting it with the Client/Server SK. This provides the
mutual authentication portion of the exchange.
__________ is an extremely powerful command-line tool that allows administrators to query and manage Active Directory objects
_____ ______ _________, ___dc=<name>\_\_\_ dc=<name>\_\_\_\_ lists users in the Staff OU</name></name>
________ ________ ________ _ | _______
find and remove computers tht have been inactive for four weeks
________ ____ _________ Lists all the organizational untis starting at the “domainroot”
Dsquery.exe
Dsquery user ou=staff
Dsquery computer -inactive 4 | dsrm
Dsquery ou domainroot
_______ is a GUI tool that performs operations against a directory, it allows viewing of stored objects and their metadata, such as security descriptors
_______ is a CLI too used for object creation, queries, and modification of Active Directory objects
LDP.exe
LDIFDE.exe
__________ is a key feature of active directory, providing for ease of administration and security, its primary purpose is to apply policy settings to computers and users in an active directory domain
Group Policy
_____ are a collection of settings contained in a file that efficiently apply user and computer configurations for a domain
What are the four things there linked too?
GPOs
Sites
Domain
OUs
What are the two default GPOs?
________ Policy for the domain and linked to the domain
_________ domain controller policy and linked to the domain controller’s OU.
Default Domain Policy
Default Domain Controller Policy
_________ is a collection of folders that exist on each domain controller to store elements of GPOs and domain public files
SYSVOL
What are the sub-folders of SYSVOL?
________ Contains Registry settings to be applied to computer HKEY_LOCAL_MACHINE settings.
______ Contains Registry settings to be applied to the user’s HKEY_CURRENT_USER settings
Machine
User
The ____________ setting of the GPO customizes the users environment at the computer level
What functions does it perform?
Computer Configuration
Deploys software application policies
specifies security settings to restrict access to files/folders, configure account policies, and control user rights
The _________ setting of the GPO customizes the user’s environment at the user level.
Do these perform the same functions as Computer configuration?
Computer configuration usually overwrites user configuration settings T/F?
User Configuration
Yes
T
Computer and user configuration settings include
_____________ Apply to the implementation of programs in Active Directory. They are either published or assigned.
_____________ Hold startup/logon/logoff/shutdown scripts. Security settings are also available here.
_________________ Hold group policy settings from the registry. To change the start menu or Desktop, configure a template.
Software settings
Window Settings
Administrative Templates
What is the Group Policy processing order?
Domain GPOs
Local Policies
Site GPOS
OU GPOS
What are the exceptions too group Policy processing order?
_______ Previously processed policies are not overwritten
________ Policy settings are not inherited from above
______ is disabled
__________
- Local policies
- Site GPOs
- Domain GPOs
- OU GPOs
Enforce
Block Policy inheritance
GPO
Permissions