TGS-REP TICKET decrypting problem
Zheng, Kai
kai.zheng at intel.com
Tue Jun 10 10:14:09 EDT 2014
Perhaps you can export the keys for the server principal into keytab file if you can access the KDC. Many application servers use keytab to get the decryption key when validates client ticket. I'm not sure there're existing tool that allows to repeat the process buried in Kerberos implementation to create the exact keys. It also depends on what encryption type you're using.
Kai
-----Original Message-----
From: krbdev-bounces at mit.edu [mailto:krbdev-bounces at mit.edu] On Behalf Of somenath saha
Sent: Tuesday, June 10, 2014 9:56 PM
To: Wang Weijun
Cc: krbdev at mit.edu
Subject: Re: TGS-REP TICKET decrypting problem
thanks guys,
It will help me to find out the secret key of server. but my initial question is not that. i want to know that how to create this secret key. i mean, in order to create this secret key what argument is needed. Because i want to decrypt the ticket (which i got from TGS_REP) from server side and my question is that how to prepare this secret key (what is the
credential?) and how i got this credential... help me out guys
regards
somenath
On Tue, Jun 10, 2014 at 4:49 PM, Wang Weijun <weijun.wang at oracle.com> wrote:
>
> On Jun 10, 2014, at 19:11, somenath saha <saha.somenath.88 at gmail.com>
> wrote:
>
> > currently i try to use NTDSXtract tool. I think esedbexport works
> > only
> in UNIX. am i right max?
>
> Maybe. I compile/run esedbexport and run dskeytab.py on a Mac. I
> suppose Linux should also works.
>
> --Max
>
>
_______________________________________________
krbdev mailing list krbdev at mit.edu
https://mailman.mit.edu/mailman/listinfo/krbdev
More information about the krbdev
mailing list