Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol all
»
Archive
Next:
Contents
Contents
Attacking NTLM with Precomputed Hashtables
warlord
warlord@nologin.org
Contents
Introduction
The design of LM and NTLM
The LanMan disaster
NTLM
The NTLM challenge
Breaking NTLM with precomputed tables
Attacking the first part
Table creation
The big problem
Breaking the second part of the password
How to get the victim to log into the rogue server?
Things to remember
Covering it up
Bibliography
About this document ...