Windows Authentication Flashcards
1
Q
Define SAM
A
Security Accounts Manager database where user account information is stored
2
Q
SAM Locations
A
Computer\HKEY_LOCAL_MACHINE\SAM\SAM
C:\WIndows\System32\config\SAM
3
Q
Define NTLM
A
NT LAN Manager
4
Q
Explain the NTLM Process
A
- User shares their username, password and domain name with the client.
- Client develops a hash — and deletes the full password.
- Client passes a plain text version of the username to the relevant server.
- Server replies to the client with a challenge, which is a 16-byte random number.
- Client sends the challenge encrypted by the hash of the user’s password.
- Server then sends the challenge, response and username to the domain controller (DC).
- DC retrieves the user’s password from the database and uses it to encrypt the challenge.
- DC then compares the encrypted challenge and client response. If these two pieces match, then the user is authenticated and access is granted.
5
Q
Explain the Kerberos Process
A
- User/client generates authenticator with timestamp encrypted with user password
- Client sends authenticator to KDC
- KDC looks up user, checks timestamp, decrypts authenticator
- KDC responds with timestamped TGT
- Client decrypts TGT with password
- Client requests server access to KDC
- KDC updates TGT with access to server
- Client gains access to server with updated TGT
6
Q
Define TGT
A
Ticket Granting Ticket