This article explains how to use Wireshark to capture the Kerberos packet sent during the Agentless DSSO authentication flow for Okta Customer Support.
- Directories
- Agentless Desktop Single Sign-On (Agentless DSSO)
- Kerberos
- Wireshark
- Download and install Wireshark on the machine used in Agentless DSSO Authentication (https://www.wireshark.org/).
- Once installed, launch Wireshark and select the adapter responsible for handling traffic between the host and the Domain Controller.
- Stop the Wireshark capture by selecting the red square icon.
- Select Edit > Preferences > Protocols > KRB5, check both boxes under the Kerberos header, ensure the TCP and UDP ports are set to the correct Kerberos port for the domain, and then select Okay.
- Open a Command Prompt as a standard user and run the following command:
-
klist purge
-
- Start the Wireshark capture by selecting the blue fin icon. Select Continue without Saving to clear the previous results.
- Open a web browser and navigate to the Okta URL to begin the Agentless DSSO flow. Once it finishes, stop the Wireshark capture.
- Type "Kerberos" in the filter to verify the results.
- If there are no entries found, confirm the correct adapter is selected.
- An NTLM token can also result in no entries found. Use Fiddler to capture the flow and confirm whether the token is NTLM or Kerberos.
- Capturing A Fiddler Trace For Okta Customer Support.
- Search "Authorization: Negotiate" in the results.
- An NTLM token can also result in no entries found. Use Fiddler to capture the flow and confirm whether the token is NTLM or Kerberos.
- A token beginning in YII is a Kerberos token, and a token beginning in TlR is an NTLM token.
- Select File > Save As and save the file in .pcapng format.
