SEC560.5 domain domination and Azure annihilation Flashcards
Three components of Kerberos
- KDC (key distribution center)
- Client (requesting services)
- Service (Service Principal Name)
SPN
Service Principal Name
Each party in a Kerberos environment _______ to the Kerberos server and receives a __________
- Authenticates
- TGT (ticket granting ticket)
If Kerberos can’t be used, Windows will fall back to _____
NTLM v1/v2
Primary authentication mechanism in the Microsoft Active Directory domain
Kerberos
Kerberos allows a _________ and _________ to authenticate over an _________ _________ channel
Client
Server
Insecure
Network
KDC
Key distribution center
SPN is an exclusive term to _________
Kerberos
The AS (_________ _________) is a logical role on the _________ _________
Authentication server
Domain controller
TGS
Ticket granting service
Another logical role of the KDC/DC:
TGS (ticket granting service)
What is sent by the client in the (first) pre-authentication step for Kerberos authN?
User’s workstation sends AS-REQ to the AS
What does the AS-REQ include?
Timestamp encrypted with user’s NT hash
How does KDC verify AS-REQ?
Has user’s password hash in db and will attempt to decrypt the message
What happens if KDC can verify AS-REQ?
If timestamp still valid, client is given TGT by the TGS (AS-REP)
The client first receives a TGT for the _______ service and can be used to ________________________
krbtgt
Request other tickets
PAC
Privileged attribute certificate
KDC long-term secret key usage (1)
Encrypt TGT (AS-REP)
KDC long-term secret key usage (2)
Sign PAC
(AS-REP and TGS-REP)
Client long-term secret key usage (1)
Check encrypted timestamp (AS-REQ)
Client long-term secret key usage (2)
Encrypt session key (AS-REP)
Target (SPN) long-term secret key usage (1)
Encrypt service portion of the ST (TGS-REP)
Target (SPN) long-term secret key usage (2)
Sign PAC (TGS-REP)
KDC long-term secret key is the password hash of the ________ service account
krbtgt
Client long-term secret key is the _______ _________ of the ________ acct
password hash
Client
Most risky Kerberos long term secret key to compromise
KDC long-term secret key
Advantage of compromising KDC long-term secret key
Can recreate TGTs and sign PACs, allowing us to obtain all privileges within the domain
PAC contains
user’s authorization and privileges
e.g., group memberships
With ______ hash, it’s possible to forge _____ to contain any desired privilege in the domain
krbtgt
PAC
Kerberos 3 long-term keys
KDC (domain controller)
Client
Target (SPN)
Kerberos is stateful or stateless?
Stateless
In Kerberos, state is stored in ______
Tickets
PAC is contained within the ____
TGT
PAC is signed with what 2 keys
Target LT key
KDC LT key
The _____ is the first ticket received by the client
TGT
For TGT, the target is the _____ account
krbtgt
To prevent entire TGT from being tampered with
It is encrypted with KDC long-term key