NTLM для хакера. Подробное описание работы и безопасности протокола

Привет, мир! Недавно я решил пополнить свои знания протоколов NTLM'ом; и, к большому сожалению, стоящих материалов, которые бы подробно и полно описывали работу NTLM, я не нашел (есть лишь пара годных статей на английском языке, но и они, на мой взгляд, не дают нужного уровня глубины). Потому я решил написать статью, которая бы в подробностях рассказала о том, как работает данный протокол и удовлетворила даже самого душного нерда, каким автор и является))) Изучить матчасть

https://habr.com/ru/articles/993934/

#NTLM #ntlmrelay #безопасность #сетевая_безопасность #администрирование_сетей #сетевые_протоколы #аутентификация #информационная_безопасность

NTLM для хакера. Подробное описание работы и безопасности протокола

Привет, мир! Недавно я решил пополнить свои знания протоколов NTLM'ом; и, к большому сожалению, стоящих материалов, которые бы подробно и полно описывали работу NTLM, я не нашел (есть лишь пара годных...

Хабр
The Renaissance of NTLM Relay Attacks: Everything You Need to Know

NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and…

Posts By SpecterOps Team Members

Microsoft says SMB signing (aka security signatures) will be required by default for all connections to defend against #NTLMRelay attacks, starting with current Windows build (Enterprise edition) rolling out to Insiders in the Canary Channel.

In such attacks, threat actors force network devices (including domain controllers) to authenticate against malicious servers under the attackers' control to impersonate them and elevate privileges to gain complete control over the Windows domain. More here: https://www.bleepingcomputer.com/news/security/windows-11-to-require-smb-signing-to-prevent-ntlm-relay-attacks | #infosec

Windows 11 to require SMB signing to prevent NTLM relay attacks

Microsoft says SMB signing (aka security signatures) will be required by default for all connections to defend against NTLM relay attacks, starting with today's Windows build (Enterprise edition) rolling out to Insiders in the Canary Channel.

BleepingComputer
GitHub - 4ndr34z/ntlmthief

Contribute to 4ndr34z/ntlmthief development by creating an account on GitHub.

GitHub

[#PatchNow] Microsoft has released a patch for a critical elevation of privilege #zeroday #vulnerability that has purportedly been used by threat actors linked to Russian Military Intelligence to compromise multiple European organizations over the past year.

According to Microsoft, "The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane."

(External attackers could send specially crafted emails that will cause a connection from the victim to an external UNC location of attackers' control. This will leak the Net-NTLMv2 hash of the victim to the attacker who can then relay this to another service and authenticate as the victim.)

All supported versions of Microsoft #Outlook for Windows are vulnerable. Online versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected.

There is a script to help determine if your organization was targeted by actors attempting to use this vulnerability.

Bottom line: Test and patch this ASAP if your org uses Outlook.

Links to more info: https://exchange.xforce.ibmcloud.com/vulnerabilities/249053

https://msrc.microsoft.com/update-guide/en-us/vulnerability/CVE-2023-23397

#NTLMRelay #PassTheHash

Microsoft Outlook spoofing CVE-2023-23397 Vulnerability Report

IBM X-Force Exchange is a threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers