Re: Sniffing a windows domain authentication

From: Facekhan (facekhan@gmail.com)
Date: Fri Mar 17 2006 - 12:33:40 EST


My understanding is that the passwords are not sent in plain text but
are subjected to a one-way hash function (MD5, SHA-1 or something
similar) and then sent to the PDC. The PDC also does not store passwords
as plaintext but stores the hash. What is compared are the two hashes
and if they match, then authentication is successful.

If you want something more interesting check out Diffie Helman key
exchange, where two parties can decide on a shared secret over an
insecure connection without exchanging the password itself.

l00t3r wrote:

>LC5 might do what your looking for. I know they have an option to
>import network sniffer files but not sure if it will actually crack
>what your looking to do. Might be worth looking into.
>
>Ryan
>
>On 16 Mar 2006 16:32:32 -0000, spambox@barrossecurity.com
><spambox@barrossecurity.com> wrote:
>
>
>>Hello list!
>>Sometime ago I was wondering if it is possible to
>>capture the authentication packets sent from a Windows Workstation to the PDC and then crack the password. I've setup this scenario in the lab environment and sniffer these packets, but did'n find any referece about cracking the password.. Any one knows how the authentication works, and if it can be broken??
>>
>>best regards
>>
>>Carlos Barros
>>http://www.barrossecurity.com/
>>
>>------------------------------------------------------------------------------
>>This List Sponsored by: Cenzic
>>
>>Concerned about Web Application Security?
>>As attacks through web applications continue to rise, you need to proactively
>>protect your applications from hackers. Cenzic has the most comprehensive
>>solutions to meet your application security penetration testing and
>>vulnerability management needs. You have an option to go with a managed
>>service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
>>Download FREE whitepaper on how a managed service can help you:
>>http://www.cenzic.com/forms/ec.php?pubid=10025
>>And, now for a limited time we can do a FREE audit for you to confirm your
>>results from other product. Contact us at request@cenzic.com
>>------------------------------------------------------------------------------
>>
>>
>>
>>
>
>------------------------------------------------------------------------------
>This List Sponsored by: Cenzic
>
>Concerned about Web Application Security?
>As attacks through web applications continue to rise, you need to proactively
>protect your applications from hackers. Cenzic has the most comprehensive
>solutions to meet your application security penetration testing and
>vulnerability management needs. You have an option to go with a managed
>service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
>Download FREE whitepaper on how a managed service can help you:
>http://www.cenzic.com/forms/ec.php?pubid=10025
>And, now for a limited time we can do a FREE audit for you to confirm your
>results from other product. Contact us at request@cenzic.com
>------------------------------------------------------------------------------
>
>
>
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:42 EDT