August 2000
Intermediate to advanced
800 pages
21h 5m
English
Before you learn the actual details of NTLM, you need to understand that regardless of the protocol, you are always at the mercy of the user. A fully implemented Kerberos authentication using Windows 2000 offers vast improvements concerning the ability to hack into the network and steal user passwords, because there are no password hashes to steal.
Although vastly improved, Kerberos does not eliminate the most obvious techniques for obtaining access however, and these are social engineering and plain old guessing. It is a mute point to say that your environment is using encryption and that protects you when you still allow users to create passwords that are inherently weak.
Passwords that are trivial ...