SirGod Posted October 24, 2017 Report Posted October 24, 2017 The vulnerability It is a known issue that Microsoft NTLM architecture has some failures, hash stealing is not something new, it is one of the first things a pentester tries when attacking a Microsoft environment. But, most of these techniques require user intervention or traffic interception to fulfill the attack. These new attacks require no user interaction, everything is done from the attacker’s side, but of course, there are some conditions that need to be met to be successful with this attack. Link articol: http://www.sysadminjd.com/adv170014-ntlm-sso-exploitation-guide/ 9 Quote
Nytro Posted October 24, 2017 Report Posted October 24, 2017 Uhuuu, simplu si frumos, merita incercat. 1 Quote
black_death_c4t Posted October 25, 2017 Report Posted October 25, 2017 23 hours ago, Nytro said: Uhuuu, simplu si frumos, merita incercat. Diva 1 Quote
Nytro Posted October 25, 2017 Report Posted October 25, 2017 Dovlecel, traiesti? PS: Nu am gasit un share OK pe care sa testez... 1 Quote