Back to Results
First PageMeta Content
Cyberwarfare / NTLM / LM hash / Kerberos / Pass the hash / Integrated Windows Authentication / Ticket Granting Ticket / Password / Rainbow table / Computer security / Cryptography / Computer network security


A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)
Add to Reading List

Document Date: 2012-07-22 18:04:53


Open Document

File Size: 325,12 KB

Share Result on Facebook

Company

Northrop Grumman / Microsoft / /

/

Event

FDA Phase / /

Facility

Key Distribution Center / Capitol College / /

IndustryTerm

request services / attack tools / protocols / access services / open source tools / computer/network / remote server / command-line tool / client-server authentication protocol / security tools / external services / security protocols / Internet Explorer / antivirus products / /

OperatingSystem

Linux / Microsoft Windows / Windows NT / Windows 2008 / /

Organization

Army / Key Distribution Center / Ticket Granting Service / Capitol College / /

Person

Chris Campbell / Hernan Ochoa / Yakko / /

Position

Lan Manager / Editor / Windows Credential Editor / Domain Controller / administrator / Signal Officer / /

Product

Windows NT / Xtreme FS1 Headphone/Headset / Kerberos / Ashton1 / Kerberos7 / MD5 / /

ProgrammingLanguage

SQL / DC / /

ProvinceOrState

Iowa / /

Technology

client-server authentication protocol / LAN / AV / Linux / API / PKI / smart card / NTLM The NTLM protocol / security protocols / private key / NTLM protocol / Windows protocols / secret key / operating system / encryption / LM protocol / public key / DNS / Firewall / POP3 protocols / /

URL

http /

SocialTag