**Microsoft's Weak Link in Network Security Found**
In a bid to prompt organizations into abandoning the aging hashing function, security firm Mandiant has released an NTLMv1 rainbow table that can crack weak admin passwords in under 12 hours using consumer-grade hardware. This move aims to underscore the vulnerabilities of Net-NTLMv1, a widely criticized protocol introduced by Microsoft two decades ago.
Researchers have long warned about the weaknesses of this hashing function, which leaves organizations vulnerable to trivial credential theft due to its susceptibility to brute-force attacks. A single DES with 56-bit keys makes NTLMv1 an easy target for attackers.
The release of this rainbow table comes as a result of years-long research into exploiting the protocol's vulnerabilities. It will make it easier for security professionals and researchers to demonstrate the insecurity of Net-NTLMv1, which has been widely criticized but continues to be used in some sensitive networks.
Organizations relying on Windows networking are not alone in this practice. Microsoft has also been slow to deprecate NTLMv1, announcing its plans to do so last August. Despite public awareness of its weaknesses, the protocol remains prevalent due to inertia and a lack of demonstrated immediate risk.
The tables provide per-byte hash results with known plaintext challenges, allowing attackers to trivially compromise accounts using tools such as Responder, PetitPotam, and DFSCoerce. Researchers have welcomed this move, seeing it as added ammunition in their efforts to convince decision-makers to migrate off the insecure function.
Microsoft released NTLMv1 in the 1980s with OS/2 and has since acknowledged its weaknesses. However, it is not until now that a comprehensive tool set has been made available to researchers, allowing them to test its security more thoroughly.
Organizations are urged to disable Net-NTLMv1 immediately, as failing to do so will leave them open to attacks by malicious hackers. With NTLMv2 being equally weak for weaker passwords and subject to brute-force attacks, organizations must act now to protect themselves against these threats.
In a bid to prompt organizations into abandoning the aging hashing function, security firm Mandiant has released an NTLMv1 rainbow table that can crack weak admin passwords in under 12 hours using consumer-grade hardware. This move aims to underscore the vulnerabilities of Net-NTLMv1, a widely criticized protocol introduced by Microsoft two decades ago.
Researchers have long warned about the weaknesses of this hashing function, which leaves organizations vulnerable to trivial credential theft due to its susceptibility to brute-force attacks. A single DES with 56-bit keys makes NTLMv1 an easy target for attackers.
The release of this rainbow table comes as a result of years-long research into exploiting the protocol's vulnerabilities. It will make it easier for security professionals and researchers to demonstrate the insecurity of Net-NTLMv1, which has been widely criticized but continues to be used in some sensitive networks.
Organizations relying on Windows networking are not alone in this practice. Microsoft has also been slow to deprecate NTLMv1, announcing its plans to do so last August. Despite public awareness of its weaknesses, the protocol remains prevalent due to inertia and a lack of demonstrated immediate risk.
The tables provide per-byte hash results with known plaintext challenges, allowing attackers to trivially compromise accounts using tools such as Responder, PetitPotam, and DFSCoerce. Researchers have welcomed this move, seeing it as added ammunition in their efforts to convince decision-makers to migrate off the insecure function.
Microsoft released NTLMv1 in the 1980s with OS/2 and has since acknowledged its weaknesses. However, it is not until now that a comprehensive tool set has been made available to researchers, allowing them to test its security more thoroughly.
Organizations are urged to disable Net-NTLMv1 immediately, as failing to do so will leave them open to attacks by malicious hackers. With NTLMv2 being equally weak for weaker passwords and subject to brute-force attacks, organizations must act now to protect themselves against these threats.