Security Basics mailing list archives
RE: How are hashes most often compromised?
From: "Roger A. Grimes" <roger () banneretcs com>
Date: Mon, 24 Jul 2006 13:42:07 -0400
Only works on weak authentication protocols. Once XP Pro started doing SMB signing, I haven't heard of it working in Windows. Some people have claimed to be able to do it still, but I haven't seen the tool or seen the demo. -----Original Message----- From: ab [mailto:abnerian () gmail com] Sent: Monday, July 24, 2006 3:52 AM To: security-basics () securityfocus com Subject: How are hashes most often compromised? For example, i've heard talk of "hash injection". What is this, how does it work, and why would I want to do it? ------------------------------------------------------------------------ --- This list is sponsored by: Norwich University EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life. http://www.msia.norwich.edu/secfocus ------------------------------------------------------------------------ --- --------------------------------------------------------------------------- This list is sponsored by: Norwich University EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The NSA has designated Norwich University a center of Academic Excellence in Information Security. Our program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Using interactive e-Learning technology, you can earn this esteemed degree, without disrupting your career or home life. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- How are hashes most often compromised? ab (Jul 24)
- RE: How are hashes most often compromised? Roger A. Grimes (Jul 24)