Port 88 – Kerberos

Service:

krb5kdc (Kerberos Key Distribution Center)

Protocol:

TCP / UDP

Port:

88

Used for:

Authentication service in Active Directory and UNIX environments

Why It’s Open

Kerberos is the backbone of authentication in Windows domains. It’s used to issue tickets for secure authentication without sending passwords over the network.

Common Risks

  • Ticket Replay Attacks: If attackers steal a valid ticket, they can reuse it.
  • Credential Stuffing: Misconfigured environments may allow brute force.
  • TGT Abuse: Attackers with access can request forged tickets (Golden Ticket attack).
  • Kerberoasting: Attackers can extract service ticket hashes for offline cracking.

Want to save time on reporting?

Let PentestPad generate, track, and export your reports - automatically.

logo-cta

Enumeration & Testing

Check if it’s open

Terminal window
nmap -sU -p 88
nmap -p 88 --script=krb5-enum-users
kinit @

Kerberos enum with Impacket

Terminal window
GetNPUsers.py / -no-pass -dc-ip

Kerberoasting with Rubeus (Windows)

Terminal window
Rubeus.exe kerberoast

What to Look For

CheckpointWhat it means
Null sessions allowedPotential for info gathering
Weak service accountsVulnerable to kerberoasting
Clock skewCan break Kerberos authentication

Known Exploits

  1. CVE-2020-17049

A security feature bypass vulnerability in the Kerberos Key Distribution Center (KDC) allows attackers to forge service tickets via the “Bronze Bit” attack, potentially leading to unauthorized access.

🔗 NVD Entry

🔗 Microsoft Advisory

Mitigation

  • Enforce strong passwords for service accounts.
  • Disable RC4 and other weak encryption types.
  • Limit ticket lifetimes.
  • Monitor for unusual ticket usage.

Real-Life Example

Kerberoasting has been a key method for lateral movement in real-world breaches. It requires only domain user access and no special privileges.

TL;DR

  • Service: Kerberos (Authentication Protocol)
  • Default Port: 88/TCP
  • Risks: Authentication bypass, credential theft
  • Mitigation: Apply patches, monitor authentication logs, enforce strong policies