KerbCrack usage?

M

Matthew

I'm trying to figure out what the syntax / usage parameters are for
kerbcrack. Does kerbcrack work without a file generated by Kerbsniff?
What should a file generated by kerbsniff look like. I did use it on
my network and got something like:

<ComputerNAME>
<3232328930839012983-VERY LONG STREAM-232131546543>

The bottom stream was very long but i ran it against SID2User and it
did not turn up anything so I didn't think it was an SID. There were
no dashes in it also.

So how can i use kerbcrack against a remote machine if i know the
Domain / Workgroup / Machine name and a log on I.D.? Can i write my
own file with these parameters?

I have 60 days to do a security audit that will wow my CORP
headquarters. Any help is greatly appriciated.

Thx
Matthew
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top