🖊️Author: Nairuz Abulhul
🌐 Blog: R3dbuck3t
NTLM authentication is used for Windows authentication with systems configured as a member of a workgroup.
🏗️ Authentication Components:
<aside> 📌 NTLM is a challenge-response authentication protocol
</aside>
Authentication Process
client
**sends a request to the server
, and the server responds with a challenge( referred to as nonce is a 16-bit random number)
password hash with the challenge
and sends it over to the server.username, the challenge, and the client's encrypted response** **to the domain controller.**
domain controller
encrypts the user's hash again (password hash and the challenge value) and compares it with the stored password hashes. If it matches, the user is allowed to authenticate to the domain.Common Attacks against NTLM Authentication
NTLM hashes can be captured through poisoning the network traffic with tools like **Responder or Inveigh - LLMNR Poisoning**
NTLM and NTLMv2 hashes are both susceptible to cracking offline.
NTLM hashes are bypassable; an attacker can use the hashed to perform a **Pass the Hash (PtH)
**attack and authenticate to the targeted machine.
NTLMv2 hashes are NOT bypassable; an attacker can’t use them to perform a Pass the Hash (PtH)attack
; they can either be relayed or crack it offline.
NTLM Relays:
<aside> 📌 LSASS is a process that is responsible for handling authentication for NTLM and Kerberos.
</aside>