|
The innerContext is Kerberos, so I'd like to see the
Mechanism and innerContextToken, so I can then decode the
innerContextToken as Krb5 and see the ticket, etc. I can see the TGS-REP coming back to the client before it started GSS with the server. I have the server's keytab file. Shouldn't I be able to decrypt the enc-part of the service ticket in the TGS-REP? I don't see where in the GUI to cause that to be decoded (I did specify the keytab file in the protocol settings for the kerberos protocol). Ultimately, my goal is to see the Microsoft authorization PAC, which I'm trying to use in my code to perform authorization. Thanks! Brian Atkins Guy Harris wrote: Brian Atkins wrote: --
Brian Atkins Solutions Architect Indicative Software, Inc. From Visibility to Vision www.indicative.com Mobile: +1 919.757.7054 |
_______________________________________________ Wireshark-users mailing list [email protected] http://www.wireshark.org/mailman/listinfo/wireshark-users
