Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding Kerberos Support #47

Open
wants to merge 3 commits into
base: master
Choose a base branch
from
Open

Conversation

Parrishjm
Copy link

A fairly simple method of adding in Kerberos support. Very little code is added to achieve this and most of it is boiler plate to tell which type of connection we should be making. Additionally if Kerberos is selected a startTLS() call is made. Lastly gssapi was added as a requirement.

The usage of this new feature would work as follows:

  1. if you dont have Kerberos support installed, install it and configure it for the environment you plan to run this.
  2. obtain a ccache file using kinit or obtain one through other methods.
  3. preform ldapdomaindump with the -k flag, remembering to provide a FQDN instead of an IP address.
  4. Get ldapdomaindump using Kerberos.

This has been tested on kali machines. Tests were preformed using all previous methods of commands I could think of to ensure to logic was removed as well as in multiple domain setups to include ones with channel binding and signing requirements. No issues were found.

Adds the -k option which is Kerberos. The intended steps are

1. Kinit or obtain a ccache for the desired user
2. use -k
2. supply username in either domain\\user format or just user format.
3. provide a FQDN for the DC
4. profit.
Brought up to date and made sure only changes related to kerberos exist
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant