background preloader

Kerberos: The Network Authentication Protocol

Kerberos: The Network Authentication Protocol
Recent News Old news is archived. 24 Feb 2015 - krb5-1.11.6 is released The krb5-1.11.6 source release is now available. 18 Feb 2015 - krb5-1.12.3 is released The krb5-1.12.3 source release is now available. 11 Feb 2015 - krb5-1.13.1 is released The krb5-1.13.1 source release is now available. What is Kerberos? Kerberos is a network authentication protocol. The Internet is an insecure place. Some sites attempt to use firewalls to solve their network security problems. Kerberos was created by MIT as a solution to these network security problems. Kerberos is freely available from MIT, under copyright permissions very similar those used for the BSD operating system and the X Window System. In summary, Kerberos is a solution to your network security problems. $Id: index.html,v 1.215 2015/02/25 23:38:52 tlyu Exp $ All images and text on this page are copyright MIT. MIT Kerberos [ home ] [ contact ]

Directory service A directory service is a software system that stores, organizes, and provides access to information in a computer operating system's directory. In software engineering, a directory is a map between names and values. It allows the lookup of named values, similar to a dictionary. As a word in a dictionary may have multiple definitions, a directory service can associate a name with multiple, different pieces of information. Introduction[edit] A directory service called a naming service, maps the names of network resources to their respective network addresses. A directory service defines the namespace for the network. A directory service is a shared information infrastructure for locating, managing, administering, and organizing common items and network resources, which can include volumes, folders, files, printers, users, groups, devices, telephone numbers and other objects. Replication and Distribution have very distinct meanings in the design and management of a directory service.

Top 50 Hacking Tools That You Must Have Whether you are a Penetration tester, a hacker or an aspiring newbie trying to learn Cyber Security, you must have a nice catalogue of tools to make your life easier. While these tools do make working simpler but cannot compensate for the vast amount of knowledge required in this field. In this post i’m going to mention 50 different tools under 9 categories that your ‘Hack Lab’ must have. Most of the tools mentioned in this post are pre-included in Kali Linux which you can install to have them at once. Intrusion Detection Systems :- These are the tools you must have if you’re building a hack lab for penetration testing or for any security arrangement. SnortNetCop Encryption Tools :- While the above tools do identify any suspicious activity but they can’t protect your data, you need encryption tools for that. TrueCrypt (The project has been shut down and no longer supported)OpenSSHPuttyOpenSSLTorOpenVPNStunnelKeePass Port Scanners :- NmapSuperscanAngry IP Scanner Packet Sniffers :- Enjoy..!!

Samba - opening windows to a wider world MIT Formally Kicks Off Cybersecurity Work -- Campus Technology Security MIT Formally Kicks Off Cybersecurity Work By Dian Schaffhauser03/16/15 MIT has shared additional details on how it plans to spend a $15 million cybersecurity grant. The multidisciplinary effort will address cybersecurity from three directions: technology, public policy and organizational management. For the technology angle, Cybersecurity@CSAIL will continue work into hardware- and software-based approaches to computer security. For the organizational side, MIT Sloan's interdisciplinary Consortium for Improving Critical Infrastructure in Cybersecurity, otherwise known as (IC)3, will focus on the human element — how organizations can make sure staff and other internal users don't create security vulnerabilities, intentionally or otherwise. Alongside CSAIL and Sloan, MIT's departments of political science and economics, and the Science, Technology, and Society program will also work to understand the security dynamics of large networked systems, with the aim of guiding policymakers.

Logging in to Mac OS X using Kerberos and LDAP | Classroom and Lab Computing This document will explain how to configure a Mac running Tiger (Mac OS X 10.4.x) or Leopard (Mac OS X 10.5.x) or Snow Leopard (Mac OS X 10.6.x), such that all Penn State Access Account users will be able to log in to the Mac. The configuration will utilize Kerberos for authentication and LDAP for authorization. Please Note: We have a public wiki documentation page that is updated more frequently than this page. This page might be archived soon! First, verify which version of the Mac OS you are running, 10.4.x, 10.5.x, 10.6.x, or 10.7.x: WARNING: If you intend to implement this method on Mac OS X Lion, be sure to upgrade to 10.7.2 or later. From the Apple Menu, select 'About This Mac'. Definitions For Terms Used in this Document Authentication A process that uses a piece of information provided by the user (typically a password) to verify the identity of that user. Authorization The determination of whether a user has permission to access a particular set of information. Kerberos Login Process

5 Killer Tricks to Get the Most Out of Wireshark Wireshark has quite a few tricks up its sleeve, from capturing remote traffic to creating firewall rules based on captured packets. Read on for some more advanced tips if you want to use Wireshark like a pro. We’ve already covered basic usage of Wireshark, so be sure to read our original article for an introduction to this powerful network analysis tool. Network Name Resolution While capturing packets, you might be annoyed that Wireshark only displays IP addresses. You can convert the IP addresses to domain names yourself, but that isn’t too convenient. Wireshark can automatically resolve these IP address to domain names, although this feature isn’t enabled by default. You can enable this setting by opening the preferences window from Edit -> Preferences, clicking the Name Resolution panel and clicking the “Enable Network Name Resolution” check box. Start Capturing Automatically wireshark -i # -k For more command-line shortcuts, check out Wireshark’s manual page. tshark -i # -w filename

Mac OS X Kerberos Authentication Setup | Classroom and Lab Computing This document details the steps required to activate Mac OS X Kerberos authentication. It does not describe why you would want to do so, or how to test that you've performed this configuration properly. For that, you should read the document Authenticating and Authorizing Mac OS X Users. This method to activate Kerberos authentication will only work under Tiger (Mac OS X 10.4.x), Leopard (Mac OS X 10.5.x), and Snow Leopard (Mac OS X 10.6.x), Lion (Mac OS X 10.7.2+), and Mountin Lion (Mac OS X 10.8.x). Activating Mac OS X Kerberos Authentication Time sync your Mac. • For Tiger (Mac OS X 10.4.x), Leopard (Mac OS X 10.5.x), and Snow Leopard (Mac OS X 10.6.x), Follow These Steps: Modify the /private/etc/authorization file to allow Kerberos authentication. • For Lion (Mac OS X 10.7.2+), and Mountin Lion (Mac OS X 10.8.x), Follow These Steps: Modify the /private/etc/pam.d/authorization and /private/etc/pam.d/screensaver files to allow Kerberos authentication at the LoginWindow and ScreenSaver.

Wi-Fi Protected Setup Flaws Make Wireless Network Brute-force Attacks Feasible Design flaws in the Wi-Fi Protected Setup (WPS) wireless standard can make it easier for attackers to obtain access codes for secured wireless networks by brute force. The vulnerabilities identified by security researcher Stefan Viehbock affect a large number of WPS-enabled routers and wireless access points. The WPS standard was created in 2007 by the Wi-Fi Alliance in order to provide non-technical users with a simple method of setting up wireless networks. The standard supports several Wi-Fi authentication methods including one that requires pushing a physical button on the router and one that uses a predefined PIN number printed on a sticker by the device manufacturer. The PIN-based method is mandatory for WPS-certified devices, which support it by default. Devices that are WPS-capable, but aren't certified, are also likely to use the method. The WPS PIN is an eight-digit random number. The main problem lies with how devices respond to failed WPS authentication attempts. The U.S.

Related: