Multiple Groups Exploit NTLM Flaw in Microsoft Windows (www.darkreading.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 17 Apr 13:06
https://sh.itjust.works/post/36271209

#cybersecurity

threaded - newest

sugar_in_your_tea@sh.itjust.works on 17 Apr 13:17 collapse

Posted by Microsoft way back in 2010 (date pulled from Wikipedia):

TLM does not support any recent cryptographic methods, such as AES or SHA-256. It uses cyclic redundancy check (CRC) or message digest algorithms ([RFC1321]) for integrity, and it uses RC4 for encryption. Deriving a key from a password is as specified in [RFC1320] and [FIPS46-2]. Therefore, applications are generally advised not to use NTLM.

If your org still uses NTLM, that’s on you.