Informative Information for the Uninformed | ||||||||||||||
|
||||||||||||||
Covering it upHaving read this paper the reader should by now realize that NTLM, an authentication mechanism that probably most computers on this planet support, is actually a big threat to hosts and entire networks. Especially with the recently discovered remote Windows exploits that require valid accounts on the victim machines for the attacker to log into first, a worm that makes people visit a website, which in turn makes them log into a rogue server that breaks the hash and automatically exploits the victim is a frightening threat scenario.
|