Follow us on Twitter!
One mans freedom fighter, another's terrorist.
Wednesday, April 16, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 15
Guests Online: 13
Members Online: 2

Registered Members: 82808
Newest Member: Krish
Latest Articles
View Thread

HellBound Hackers | Computer General | Increasing Security

Author

NTLM White Paper


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 01-04-06 07:26
http://www.uninformed.org/?v=3&a=2&t=pdf

I thought I'd post this whtie paper, because I found it exceptionally explanatory about NTLM Hashes, and the whole hashing process. Smile Granted, NTLM Hashing is "teh sux", but still, useful to know in order to increase the security of any network using the NTLM hashing function.
Author

RE: NTLM White Paper


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 29-06-06 00:16
wow this is cool. Is there any program out there that can quickly crack NTLM hashes as described in the paper?...'cause I could very easily get computers to login to the rogue server. Oh and if anyone is looking for a good "rogue server", the metasploit framework includes one....although, I'm not sure if it has a static challenge like described in the paper or not.