.

Kerberos


Reading time: less than 1 minute

Kerberos only uses secret-key Cryptography instead of public-key cryptography. It is a lot easier to design those.

Discovering KDCs

I needed a way to find KDCs for a domain. Here’s how I did it for TCP and UDP.

dig SRV _kerberos._udp.DOMAINNAME

And similarly for TCP.

dig SRV _kerberos._tcp.DOMAINNAME

Citation

If you find this work useful, please cite it as:
@article{yaltirakli,
  title   = "Kerberos",
  author  = "Yaltirakli, Gokberk",
  journal = "gkbrk.com",
  year    = "2025",
  url     = "https://www.gkbrk.com/kerberos"
}
Not using BibTeX? Click here for more citation styles.
IEEE Citation
Gokberk Yaltirakli, "Kerberos", January, 2025. [Online]. Available: https://www.gkbrk.com/kerberos. [Accessed Jan. 20, 2025].
APA Style
Yaltirakli, G. (2025, January 20). Kerberos. https://www.gkbrk.com/kerberos
Bluebook Style
Gokberk Yaltirakli, Kerberos, GKBRK.COM (Jan. 20, 2025), https://www.gkbrk.com/kerberos

Comments

© 2025 Gokberk Yaltirakli