Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Understanding NTLM

Why does Microsoft use this protocol at all? After all, there are far more effective protocols such as Kerberos that are already offered in Windows 2000. The primary reason, of course, is that most organizations need the backward compatibility that NTLM offers. We want to connect our Windows NT and Windows 95/98 machines to Windows 2000.

Although this eases the administrative overhead of using these legacy machines, it poses a problem because of its inherent weaknesses. The primary weakness consists of the ability to capture the challenge response hashes and crack the passwords of our users. I address this in the following section on the risks of using NTLM.

The NTLM Versions in Use

For now, let's discuss the background of ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book