![](/static/61a827a1/assets/icons/icon-96x96.png)
3·
1 day agoYou exchange public keys and then email using your recipient’s key to encrypt it. Only they would then be able to decrypt it, using their private key.
https://www.infoworld.com/article/2334365/understand-diffie-hellman-key-exchange.html
That’s wild… how’d he get the email client to send the NTLM hash? That’s the real story, there. If you can remotely pull sensitive files like that, you already own that computer. That’s an email client vuln, not an issue with the method of encryption.
Oh… that’s not good. I’m guessing the client was Outlook. In which case, Outlook had a vuln and that was the issue, not the encryption. Or maybe it was windows itself which was vulnerable.
I skimmed kind of quick, but it sounds like Kevin used html email to embed something that loaded from a server he owned. That gave him the target IP, he then did some kind of NetBIOS request where windows sent the NTLM challenge response. That was apparently vulnerable to cracking in such a way that revealed the actual NTLM hash of the windows user being emailed. Then THAT hash was crackable to reveal the actual password of the user.
Not totally sure I read that right, but wow, that is an old ass vuln for windows to still have as late as 2017.