Company X has a portal login on their webserver for employee and vendor logins. Sniffing the traffic after logging in as an employee I see that the password is sent as NTLM hash.
Since the hash itself is being sent cleartext it can be intercepted and then run against a set of rainbow tables, etc. I imported the .pcap into Cain and gave the cracker a custom set of alphanumerics and did "crack" the hash.
But what are the other issues? Could this hash also just be spoofed by someone else and sent to the server and then a 3rd party could gain entry?
This isn't my area of expertise so if you've got comments I'd love to hear them.
Since the hash itself is being sent cleartext it can be intercepted and then run against a set of rainbow tables, etc. I imported the .pcap into Cain and gave the cracker a custom set of alphanumerics and did "crack" the hash.
But what are the other issues? Could this hash also just be spoofed by someone else and sent to the server and then a 3rd party could gain entry?
This isn't my area of expertise so if you've got comments I'd love to hear them.
Comment