Useful Links
1. Foundations of Windows Authentication
2. NTLM Protocol Architecture
3. NTLM Security Vulnerabilities
4. Kerberos Protocol Fundamentals
5. Kerberos Security Vulnerabilities
6. Attack Methodology and Lateral Movement
7. Detection and Monitoring
8. Mitigation and Hardening Strategies
  1. Computer Science
  2. Cybersecurity

Kerberos and NTLM Security Vulnerabilities

1. Foundations of Windows Authentication
2. NTLM Protocol Architecture
3. NTLM Security Vulnerabilities
4. Kerberos Protocol Fundamentals
5. Kerberos Security Vulnerabilities
6. Attack Methodology and Lateral Movement
7. Detection and Monitoring
8. Mitigation and Hardening Strategies
  1. NTLM Protocol Architecture
    1. NTLM Evolution and Versions
      1. LAN Manager (LM) Protocol
        1. NTLM Version 1 (NTLMv1)
          1. NTLM Version 2 (NTLMv2)
            1. Extended Session Security
              1. Current Status and Deprecation
              2. NTLM Authentication Process
                1. Type 1 Message (Negotiate)
                  1. Type 2 Message (Challenge)
                    1. Type 3 Message (Authentication)
                      1. Challenge-Response Mechanism
                        1. Session Key Establishment
                        2. NTLM Hash Types
                          1. LM Hash
                            1. DES-based Algorithm
                              1. Case Insensitivity Weakness
                                1. 14-Character Limitation
                                  1. Storage Format
                                  2. NT Hash
                                    1. MD4-based Algorithm
                                      1. Unicode Support
                                        1. Storage Format
                                          1. Salting Absence
                                        2. NTLM in Network Protocols
                                          1. SMB/CIFS Authentication
                                            1. HTTP NTLM Authentication
                                              1. LDAP NTLM Authentication
                                                1. RPC Authentication
                                                2. NTLM Storage Mechanisms
                                                  1. SAM Database Storage
                                                    1. LSASS Memory Storage
                                                      1. Cached Credentials
                                                        1. Registry Storage Locations

                                                      Previous

                                                      1. Foundations of Windows Authentication

                                                      Go to top

                                                      Next

                                                      3. NTLM Security Vulnerabilities

                                                      © 2025 Useful Links. All rights reserved.

                                                      About•Bluesky•X.com