Mandiant Releases NTLMv1 Rainbow Table to Crack Weak Admin Passwords in Under 12 Hours
Security firm Mandiant has released a database of precomputed hash values, known as a rainbow table, that allows attackers to crack administrative passwords protected by Microsoft's outdated NTLM.v1 hashing function in under 12 hours. This move aims to demonstrate the vulnerability of this deprecated protocol and provide a tool for security professionals to show its insecurity.
The NTLMv1 protocol has been widely criticized due to its limited key space, making it easy to brute-force and crack passwords. Despite being released two decades ago, tools that exploit this protocol have existed for years, but required sensitive data or expensive hardware to be effective. Mandiant's release of the rainbow table changes this by providing a simple way for attackers to recover passwords using consumer-grade hardware.
The tables, hosted in Google Cloud, work against Net-NTLMv1 passwords, which are used in network authentication for accessing resources such as SMB sharing. This protocol is still in use on some of the world's most sensitive networks, despite being widely known to be insecure. Mandiant consultants continue to identify its use in active environments, citing inertia and a lack of demonstrated immediate risk.
The release of the rainbow table has sparked a mixed response from security professionals and researchers. While some see it as a useful tool for demonstrating the vulnerability of NTLMv1, others have expressed concerns about its potential impact on organizations that may already be using these tables or have better methods to crack passwords.
Mandiant's goal is to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. The company advises organizations to immediately disable the use of this protocol and has provided basic steps for moving off NTLMv1.
Organizations that fail to heed these warnings will have only themselves to blame if they are compromised by hackers exploiting this vulnerability. As one security expert noted, Mandiant's release of the rainbow table is a wake-up call for organizations that have been relying on legacy protocols like NTLMv1.
Security firm Mandiant has released a database of precomputed hash values, known as a rainbow table, that allows attackers to crack administrative passwords protected by Microsoft's outdated NTLM.v1 hashing function in under 12 hours. This move aims to demonstrate the vulnerability of this deprecated protocol and provide a tool for security professionals to show its insecurity.
The NTLMv1 protocol has been widely criticized due to its limited key space, making it easy to brute-force and crack passwords. Despite being released two decades ago, tools that exploit this protocol have existed for years, but required sensitive data or expensive hardware to be effective. Mandiant's release of the rainbow table changes this by providing a simple way for attackers to recover passwords using consumer-grade hardware.
The tables, hosted in Google Cloud, work against Net-NTLMv1 passwords, which are used in network authentication for accessing resources such as SMB sharing. This protocol is still in use on some of the world's most sensitive networks, despite being widely known to be insecure. Mandiant consultants continue to identify its use in active environments, citing inertia and a lack of demonstrated immediate risk.
The release of the rainbow table has sparked a mixed response from security professionals and researchers. While some see it as a useful tool for demonstrating the vulnerability of NTLMv1, others have expressed concerns about its potential impact on organizations that may already be using these tables or have better methods to crack passwords.
Mandiant's goal is to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. The company advises organizations to immediately disable the use of this protocol and has provided basic steps for moving off NTLMv1.
Organizations that fail to heed these warnings will have only themselves to blame if they are compromised by hackers exploiting this vulnerability. As one security expert noted, Mandiant's release of the rainbow table is a wake-up call for organizations that have been relying on legacy protocols like NTLMv1.