<--- Back to Details
First PageDocument Content
Cyberwarfare / NTLM / Integrated Windows Authentication / Server Message Block / LAN Manager / Cryptographic nonce / Authentication protocol / Challenge-response authentication / Windows / Computing / Computer security / Computer network security
Date: 2012-04-07 14:52:55
Cyberwarfare
NTLM
Integrated Windows Authentication
Server Message Block
LAN Manager
Cryptographic nonce
Authentication protocol
Challenge-response authentication
Windows
Computing
Computer security
Computer network security

Understanding the Windows SMB NTLM Authentication Weak Nonce Vulnerability Hernan Ochoa

Add to Reading List

Source URL: media.blackhat.com

Download Document from Source Website

File Size: 2,82 MB

Share Document on Facebook

Similar Documents

Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

DocID: 1xUUI - View Document

Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

DocID: 1o9AS - View Document

Three-factor user authentication method using biometrics challenge response Haruhiko Fujii, Yukio Tsuruoka Nippon Telegraph and Telephone Corporation {fujii.haruhiko, tsuruoka.yukio}@lab.ntt.co.jp Abstract: We propose a

DocID: 1lxXl - View Document

Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

DocID: 1fJRY - View Document

draft-melnikov-httpbis-scram-auth-01 - Salted Challenge Response …SCRAM— HTTP Authentication Mechanism

DocID: 1e7OC - View Document