![]() |
Informative Information for the Uninformed | ![]() |
||||||||||||
![]() |
![]() |
|||||||||||||
![]() ![]() |
![]() |
|
||||||||||||
![]() |
Covering it upHaving read this paper the reader should by now realize that NTLM, an authentication mechanism that probably most computers on this planet support, is actually a big threat to hosts and entire networks. Especially with the recently discovered remote Windows exploits that require valid accounts on the victim machines for the attacker to log into first, a worm that makes people visit a website, which in turn makes them log into a rogue server that breaks the hash and automatically exploits the victim is a frightening threat scenario.
|