Security firm Mandiant has released a database that can crack weak admin passwords protected by Microsoft's NTLM.v1 hash algorithm in under 12 hours, using consumer hardware costing less than $600 USD. This "rainbow table" allows hackers to take over accounts by quickly mapping a stolen hash to its password counterpart.
The database works against Net-NTLMv1 passwords, which are used in network authentication for accessing resources such as SMB network sharing. Despite being widely recognized as vulnerable due to its limited keyspace, NTLM.v1 remains in use in some sensitive networks due to inertia and the high cost of migration.
Mandiant's release aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. The company notes that tools to exploit this protocol have existed for years but often required expensive hardware or uploading sensitive data to third-party services.
The database allows attackers to recover passwords using a known plaintext attack, providing them with an easy way to crack NTLM.v1 hashes. This move is likely to provide added ammunition for security professionals when trying to convince decision-makers to migrate away from the insecure function.
Organizations that fail to disable the use of Net-NTLMv1 are advised to do so immediately, as they will have only themselves to blame if their systems are hacked due to this vulnerability. The release comes as a reminder that some legacy protocols can leave organizations vulnerable to trivial credential theft, and that it is essential to prioritize security and invest in modernizing outdated systems.
The move has been applauded by researchers and admins on social media, who see the release of the rainbow table as a valuable resource for demonstrating the insecurity of NTLM.v1 and making the case for its migration. As Mandiant's consultants continue to identify the use of NTLM.v1 in active environments, it is clear that this legacy protocol remains a significant vulnerability that organizations must address urgently.
The database works against Net-NTLMv1 passwords, which are used in network authentication for accessing resources such as SMB network sharing. Despite being widely recognized as vulnerable due to its limited keyspace, NTLM.v1 remains in use in some sensitive networks due to inertia and the high cost of migration.
Mandiant's release aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. The company notes that tools to exploit this protocol have existed for years but often required expensive hardware or uploading sensitive data to third-party services.
The database allows attackers to recover passwords using a known plaintext attack, providing them with an easy way to crack NTLM.v1 hashes. This move is likely to provide added ammunition for security professionals when trying to convince decision-makers to migrate away from the insecure function.
Organizations that fail to disable the use of Net-NTLMv1 are advised to do so immediately, as they will have only themselves to blame if their systems are hacked due to this vulnerability. The release comes as a reminder that some legacy protocols can leave organizations vulnerable to trivial credential theft, and that it is essential to prioritize security and invest in modernizing outdated systems.
The move has been applauded by researchers and admins on social media, who see the release of the rainbow table as a valuable resource for demonstrating the insecurity of NTLM.v1 and making the case for its migration. As Mandiant's consultants continue to identify the use of NTLM.v1 in active environments, it is clear that this legacy protocol remains a significant vulnerability that organizations must address urgently.