Port 464 – KPASSWD (Kerberos Password)

Service:

kpasswd

Protocol:

TCP/UDP

Port:

464

Used for:

Kerberos password changing service

Why It’s Open

Port 464 is used by Kerberos Password Change Protocol (kpasswd), which allows users to change their Kerberos passwords securely. This service is commonly found in Windows Active Directory environments and Unix/Linux systems using Kerberos authentication. It’s critical for enterprise identity management and security.

Common Risks

  • Password policy bypass
    Vulnerabilities may allow circumvention of password complexity requirements
  • Brute force attacks
    Attackers may attempt to guess user credentials
  • Protocol vulnerabilities
    Flaws in Kerberos implementation can lead to authentication bypass
  • User enumeration
    Service responses may reveal valid usernames
  • Denial of service
    Account lockout through repeated failed attempts
  • Man-in-the-middle
    Unencrypted communications may expose credentials
  • Privilege escalation
    Compromised service may grant administrative access

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Service Detection:

Terminal window
nmap -sV -p 464

Kerberos Service Enumeration:

Terminal window
nmap -p88,464 --script krb5-enum-users --script-args krb5-enum-users.realm=DOMAIN.COM

Password Change Testing:

Terminal window
kpasswd username@DOMAIN.COM nc -u 464

What to Look For

CheckpointWhat it means
Service versionIdentify Kerberos implementation and patch level
Password policy enforcementCheck if strong password requirements are enforced
Account lockout policyVerify failed attempt limits and lockout duration
Encryption in transitEnsure communications are properly encrypted
User enumeration protectionVerify service doesn’t reveal valid usernames

Mitigation

  • Implement strong password policies
    Enforce complexity requirements and regular password changes
  • Configure account lockout
    Set appropriate failed attempt limits and lockout duration
  • Use secure encryption
    Ensure all Kerberos communications are encrypted
  • Monitor authentication logs
    Log all password change attempts and authentication events
  • Network segmentation
    Restrict access to Kerberos services to trusted networks
  • Regular security updates
    Keep Kerberos implementations patched
  • Disable unnecessary features
    Remove unused authentication mechanisms

TL;DR

  • Port 464 = Kerberos Password Change service
  • Protocol: TCP/UDP
  • Used for: Kerberos password changing service
  • Security focus: Critical authentication infrastructure requiring strong security controls

Known CVEs and Exploits