Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - NTLM 100 Percent Broken Using Hashes Derived from Captures->

Submitted by uCallHimDrJ0NES
uCallHimDrJ0NES (2546640) writes "Security researcher Mark Gamache has used Moxie Marlinspike's Cloudcracker to derive hashes from captured NTLM handshakes, resulting in successful pass-the-hash attacks. It's been going on for a long time, probably, but this is the first time a "white hat" has researched and exposed the how-to details for us all to enjoy. Microsoft has posted a little guidance for those who need to turn off NTLM: http://support.microsoft.com/kb/2793313. Have fun explaining your new security project to your management, server admins!"
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

NTLM 100 Percent Broken Using Hashes Derived from Captures

Comments Filter:

Real programmers don't write in BASIC. Actually, no programmers write in BASIC after reaching puberty.

Working...