A Kerberos realm is a logical group of networked computers that share a common authentication database. The authentication database is used to store the Kerberos tickets that are issued to users and services when they authenticate to the network.
In a Kerberos environment, each networked computer is a member of a realm. The realm is responsible for authenticating users and services and for issuing and managing Kerberos tickets.
A Kerberos realm can be implemented on any type of network, including networks that are not running Windows. In fact, the Kerberos protocol was developed as an open standard and is used by many different types of operating systems and networks.
On a Windows network, a Kerberos realm is typically equivalent to a domain. Each domain in a Windows network is a member of a realm, and the domain controller is responsible for authenticating users and services and for issuing and managing Kerberos tickets.
However, on a non-Windows network, a Kerberos realm can be implemented independently of any domain structure. In this case, the Kerberos server is responsible for authenticating users and services and for issuing and managing Kerberos tickets.
The Hacker Recipes mainly covers Kerberos attacks in a Windows context, but some attacks can also be conducted in non-Windows networks.
Kerberos is an authentication protocol based on tickets. It basically works like this (simplified process):
AS-REQ, the answer is called AS-REP.TGS-REQ, the answer is called TGS-REP.AP-REQ, the service answer is called AP-REP.A Service Ticket (ST) allows access to a specific service.
When requesting a service ticket, the client (cname) specifies the service it wants to obtain access to by supplying it's sname, which can be one of 9 types (RPC 4120 section 6.2). Shortly put, the following formats are supported: