Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Why crack LM hashes with the purpose of detecting and eliminating “weak” passwords at all, then?

0
Posted

Why crack LM hashes with the purpose of detecting and eliminating “weak” passwords at all, then?

0

Solar Designer: One possible reason would be to ensure that the passwords are not as weak as to be easy to guess from the remote (or from a local login prompt, for that matter). Another reason would be to ensure that the not-so-weak NTLM hashes of the same passwords (that Windows systems use along with or instead of LM hashes) would be strong enough to withstand certain offline attacks. Someone who is into Windows security (I am not) could explain those subtle reasons better. What is the situation in the Unix world? Solar Designer: Speaking of Unix passwords, even the ancient traditional crypt(3) hashes can withstand John runs on a single CPU if extremely complicated passwords are chosen. Although it would be taking over 100 years to exhaustively search the printable US-ASCII keyspace against traditional crypt(3) hashes on a single CPU (that is currently available), in practice it is common to crack 20% to 60% of such hashes within a reasonable time (days, weeks, or months). When attac

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123