Security Basics mailing list archives

RE: How are hashes most often compromised?


From: "Roger A. Grimes" <roger () banneretcs com>
Date: Mon, 24 Jul 2006 13:42:07 -0400

Only works on weak authentication protocols. Once XP Pro started doing
SMB signing, I haven't heard of it working in Windows. Some people have
claimed to be able to do it still, but I haven't seen the tool or seen
the demo.

-----Original Message-----
From: ab [mailto:abnerian () gmail com] 
Sent: Monday, July 24, 2006 3:52 AM
To: security-basics () securityfocus com
Subject: How are hashes most often compromised?

For example, i've heard talk of "hash injection". What is this, how does
it work, and why would I want to do it?

------------------------------------------------------------------------
---
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The NSA has
designated Norwich University a center of Academic Excellence in
Information Security. Our program offers unparalleled Infosec management
education and the case study affords you unmatched consulting
experience. 
Using interactive e-Learning technology, you can earn this esteemed
degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
------------------------------------------------------------------------
---


---------------------------------------------------------------------------
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence
in Information Security. Our program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Using interactive e-Learning technology, you can earn this esteemed degree,
without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: