M
Matthew
I'm trying to figure out what the syntax / usage parameters are for
kerbcrack. Does kerbcrack work without a file generated by Kerbsniff?
What should a file generated by kerbsniff look like. I did use it on
my network and got something like:
<ComputerNAME>
<3232328930839012983-VERY LONG STREAM-232131546543>
The bottom stream was very long but i ran it against SID2User and it
did not turn up anything so I didn't think it was an SID. There were
no dashes in it also.
So how can i use kerbcrack against a remote machine if i know the
Domain / Workgroup / Machine name and a log on I.D.? Can i write my
own file with these parameters?
I have 60 days to do a security audit that will wow my CORP
headquarters. Any help is greatly appriciated.
Thx
Matthew
kerbcrack. Does kerbcrack work without a file generated by Kerbsniff?
What should a file generated by kerbsniff look like. I did use it on
my network and got something like:
<ComputerNAME>
<3232328930839012983-VERY LONG STREAM-232131546543>
The bottom stream was very long but i ran it against SID2User and it
did not turn up anything so I didn't think it was an SID. There were
no dashes in it also.
So how can i use kerbcrack against a remote machine if i know the
Domain / Workgroup / Machine name and a log on I.D.? Can i write my
own file with these parameters?
I have 60 days to do a security audit that will wow my CORP
headquarters. Any help is greatly appriciated.
Thx
Matthew