Practical Attacks against NTLMv1
1.1 Introduction This blog is meant to serve as a guide for practical exploitation of systems that allow for the NTLMv1 authentication protocol. While NTLMv1 is hardly ever needed anymore, a surprising number of organizations still use it, perhaps unknowingly. There are however some VPN products that still currently instruct their users to downgrade NLTM…
The post Practical Attacks against NTLMv1 appeared first on TrustedSec.