Follow us on Twitter!
Never in the field of human conflict was so much owed by so many to so few. - Winston Churchill
Saturday, April 29, 2017
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 58
Guests Online: 57
Members Online: 1

Registered Members: 99970
Newest Member: Krimi
Latest Articles
View Thread

HellBound Hackers | Computer General | Increasing Security

Author

NTLM White Paper


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 01-04-06 07:26
http://www.uninformed.org/?v=3&a=2&t=pdf

I thought I'd post this whtie paper, because I found it exceptionally explanatory about NTLM Hashes, and the whole hashing process. Smile Granted, NTLM Hashing is "teh sux", but still, useful to know in order to increase the security of any network using the NTLM hashing function.
Author

RE: NTLM White Paper


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 29-06-06 00:16
wow this is cool. Is there any program out there that can quickly crack NTLM hashes as described in the paper?...'cause I could very easily get computers to login to the rogue server. Oh and if anyone is looking for a good "rogue server", the metasploit framework includes one....although, I'm not sure if it has a static challenge like described in the paper or not.