Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol 3
»
2006.Jan
Next:
Introduction
Up:
Attacking NTLM with Precomputed
Previous:
Attacking NTLM with Precomputed
Contents
Introduction
The design of LM and NTLM
The LanMan disaster
NTLM
The NTLM challenge
Breaking NTLM with precomputed tables
Attacking the first part
Table creation
The big problem
Breaking the second part of the password
How to get the victim to log into the rogue server?
Things to remember
Covering it up
Bibliography