| ▲ | dbetteridge 5 hours ago |
| I recall using ntlm rainbow tables to crack windows hashes in high school in like 2008? Amazing that this is still around and causing someone enough of a headache to justify spending money on. Also amazing what a teenager with lots of free time and a bootable Linux usb can get up to. |
|
| ▲ | coopreme 4 hours ago | parent | next [-] |
| LM, nthash aka NTLM, net-ntlmv1 aka ntlmv1, net-ntlmv2 aka NTLMv2. Challenge response stuff is different. Naming here is painful. |
| |
| ▲ | dbetteridge 4 hours ago | parent | next [-] | | Ah Microsoft and naming things... Name a better combo But fair enough, I don't recall which exact version I was mucking with that long ago. | | |
| ▲ | CableNinja an hour ago | parent | next [-] | | A few years ago i was doing some vm things in azure. Hadnt touched azure before, and spent 10+ minutes of frustration trying to figure out how to get amd64/x86_64 things started, as the only thing i could find was "Azure ARM", and on googling, "arm" here means azure resource manager... ARGH why does microsoft insist on using existing names and acronyms!?!? | |
| ▲ | coopreme 4 hours ago | parent | prev [-] | | Ya they just announced they are renaming security algos to copilot!!! story here -> https://dubious-adware-breach-scam@is.gd/WVZvnI?exploit.bat | | |
| |
| ▲ | bri3d 3 hours ago | parent | prev [-] | | net-ntlmv1 rainbow tables have been around forever too though, the same attack documented in this blog post has been hosted as a web service at https://crack.sh/netntlm/ for 10+ years | | |
|
|
| ▲ | eerikkivistik 4 hours ago | parent | prev | next [-] |
| There used to be a joint online project to compute these tables in a SETI like distributed system. Everyone who contributed their CPU cycles, could use the tables. And yeah, around 2005-2008. |
|
| ▲ | rootsudo 3 hours ago | parent | prev [-] |
| yep, that and also can use cain and abel even back then... hardest part was putting whatever network card in promiscious mode. |