• 0 Posts
  • 6 Comments
Joined 4 months ago
cake
Cake day: October 19th, 2024

help-circle
  • That’s wild… how’d he get the email client to send the NTLM hash? That’s the real story, there. If you can remotely pull sensitive files like that, you already own that computer. That’s an email client vuln, not an issue with the method of encryption.

    Actually what is sent is the user’s LAN Manager (LM) or Windows NT LM network authentication challenge response, from which the user’s LM or NT hash can be computed.

    Oh… that’s not good. I’m guessing the client was Outlook. In which case, Outlook had a vuln and that was the issue, not the encryption. Or maybe it was windows itself which was vulnerable.

    I skimmed kind of quick, but it sounds like Kevin used html email to embed something that loaded from a server he owned. That gave him the target IP, he then did some kind of NetBIOS request where windows sent the NTLM challenge response. That was apparently vulnerable to cracking in such a way that revealed the actual NTLM hash of the windows user being emailed. Then THAT hash was crackable to reveal the actual password of the user.

    Not totally sure I read that right, but wow, that is an old ass vuln for windows to still have as late as 2017.