NTLM
How NTLM Hashing Works
1. Password to NTLM Hash Conversion
NTLM Authentication Process (Challenge-Response)
1. Negotiation (Type 1 Message)
2. Challenge (Type 2 Message)
3. Authentication (Type 3 Message)
Security Issues with NTLM
NTLM vs. NTLMv2 vs. Kerberos
Feature
NTLMv1
NTLMv2
Kerberos
How Attackers Exploit NTLM Hashes
How to Secure NTLM Authentication
References
Last updated