Mandiant releases rainbow table that cracks weak admin password in 12 hours

Security firm Mandiant has released a database that can crack weak admin passwords protected by Microsoft's NTLM.v1 hash algorithm in under 12 hours, using consumer hardware costing less than $600 USD. This "rainbow table" allows hackers to take over accounts by quickly mapping a stolen hash to its password counterpart.

The database works against Net-NTLMv1 passwords, which are used in network authentication for accessing resources such as SMB network sharing. Despite being widely recognized as vulnerable due to its limited keyspace, NTLM.v1 remains in use in some sensitive networks due to inertia and the high cost of migration.

Mandiant's release aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. The company notes that tools to exploit this protocol have existed for years but often required expensive hardware or uploading sensitive data to third-party services.

The database allows attackers to recover passwords using a known plaintext attack, providing them with an easy way to crack NTLM.v1 hashes. This move is likely to provide added ammunition for security professionals when trying to convince decision-makers to migrate away from the insecure function.

Organizations that fail to disable the use of Net-NTLMv1 are advised to do so immediately, as they will have only themselves to blame if their systems are hacked due to this vulnerability. The release comes as a reminder that some legacy protocols can leave organizations vulnerable to trivial credential theft, and that it is essential to prioritize security and invest in modernizing outdated systems.

The move has been applauded by researchers and admins on social media, who see the release of the rainbow table as a valuable resource for demonstrating the insecurity of NTLM.v1 and making the case for its migration. As Mandiant's consultants continue to identify the use of NTLM.v1 in active environments, it is clear that this legacy protocol remains a significant vulnerability that organizations must address urgently.
 
Wow ๐Ÿคฏ๐Ÿ’ป, just thinking about how easily hackers can crack those weak admin passwords with just $600 hardware is giving me the chills ๐Ÿ˜ฑ! The fact that Mandiant released a rainbow table to show everyone how insecure Net-NTLMv1 really is is actually super helpful for security pros trying to get decision-makers on board with migrating away from it. ๐Ÿ’ก But seriously, organizations gotta take action ASAP and disable NTLM.v1, 'cause this vulnerability is like an open door for hackers ๐Ÿšช!
 
Ugh, another innovation that just puts more bad guys on our side ๐Ÿคฆโ€โ™‚๏ธ. I mean, what's next? A database to crack every other security measure and we'll all be sleeping with one eye open ๐Ÿ’ก. $600 for a decent GPU is hardly the point - it's not like Mandiant is going to start handing out free hacking tools on a silver platter ๐Ÿค.

And yeah, I get it, NTLM.v1 is weak, but come on... can't people just upgrade already? It's like we're stuck in some kind of tech-time warp ๐Ÿ˜ด. The fact that decision-makers are still using this stuff is just laughable - it's not like they haven't had enough warnings ๐Ÿšจ.

But seriously, what's the hurry? Are we really so desperate to prove a point that we're going to use something that's literally begging to be exploited? ๐Ÿค”. I guess what I'm trying to say is, let's just take a deep breath and upgrade our security measures already... this "rainbow table" business is not exactly reassuring ๐Ÿ˜ฌ.
 
Ugh, just saw that Mandiant released this "rainbow table" thingy that can crack weak admin passwords on Microsoft's outdated NTLM.v1 hash algorithm in like 12 hours ๐Ÿคฏ! And the craziest part is it only costs $600 USD to do it with consumer hardware lol... think about all these companies still using this ancient protocol and just waiting for someone to exploit it ๐Ÿ˜’. It's like they're just begging for hackers to take over their accounts ๐Ÿšช. Mandiant's move is actually kinda genius tho, it's gonna make it super easy for security pros to show their bosses how vulnerable this stuff is ๐Ÿ’ก. But honestly, what's the point? These companies are just gonna keep using outdated systems and then they'll be crying when they get hacked ๐Ÿ˜”. They should've migrated already ๐Ÿšซ.
 
I'm telling ya, if you're still using NTLM.v1 on your network... ๐Ÿคฆโ€โ™‚๏ธ that's like putting up a big ol' neon sign saying "Hack me!" ๐Ÿ˜ณ I mean, Mandiant's just giving security pros a way to show just how weak this protocol is. It's not rocket science, folks! A $600 GPU and some basic software can crack those passwords in under 12 hours. That's like finding a needle in a haystack, but the haystack is on fire ๐Ÿ”ฅ.

And yeah, I know some orgs are too chicken to upgrade, but come on... ๐Ÿ™„ they're basically begging to be hacked. NTLM.v1 has been vulnerable for years, and it's time to face facts. It's not that hard to migrate to a newer protocol. You just need the will to do so. ๐Ÿ’ช Let's get those legacy protocols updated already! ๐Ÿ’ฅ
 
OMG, I'm low-key freaking out about this ๐Ÿคฏ! Like, how can we be using something so old and vulnerable? We're literally just giving hackers free access to our accounts with this NTLM.v1 hash algorithm ๐Ÿ˜’. And the fact that it's so easy to crack is just wild... 12 hours?! That's like, a blink of an eye in hacking terms ๐Ÿ’ฅ.

I'm all for security professionals being able to show the dangers of using this protocol, but can't we just migrate to something better already? ๐Ÿ’ธ I mean, it's not like it's gonna break the bank or anything. And what about all the people who are still using these systems because they're just too lazy to update? ๐Ÿ™„ Like, come on guys! We need to get our act together and prioritize security over convenience.

I'm loving that Mandiant is making this database available though... it's like a wake-up call for everyone. Let's just hope people take notice and start making some changes ASAP ๐Ÿ˜….
 
ugh I'm glad security firms like Mandiant are speaking out about this...it's crazy how ancient protocols like Net-NTLMv1 can still be used ๐Ÿคฏ. $600 USD for a consumer-grade computer that can crack these passwords in under 12 hours? That's just ridiculous. and to think some orgs are still using it because it's "easier" or cheaper than migration ๐Ÿ™„. I get where Mandiant is coming from, but this just makes me want to scream... when will we learn?!

anyway, I guess it's good that Mandiant's releasing this database as a tool for security pros to use against these vulnerable orgs. It's like they're saying "hey, we know you're not doing anything about this, so here's some ammo" ๐Ÿ˜’. organizations need to step up their game and prioritize security over convenience...it's just common sense now ๐Ÿ’ก.
 
๐Ÿค– just think about how easy it is to crack these old passwords ๐Ÿ™…โ€โ™‚๏ธ $600 for a super powerful machine now is like buying a laptop 5 yrs ago ๐Ÿ“Š and with all these rainbow tables online, its just a matter of time before someone does use this weakness to gain access into lots of systems ๐Ÿšจ meanwhile, security pros are gonna be all over mandiant for releasing this database ๐Ÿ’ธ
 
Ugh man ๐Ÿคฏ, just got my heart racing thinking about how easy it is for hackers to get into our systems with this old password thingy... like, we all know NTLM.v1 is super weak but some orgs are still using it and it's just... wow ๐Ÿ˜…. I mean, I'm not saying Mandiant did anything wrong by releasing the database but now that it's out there, we gotta make sure everyone knows how to fix this ASAP ๐Ÿšจ. It's like, if you're still using NTLM.v1, what are you even doing? You need to get with the times and upgrade your security game... trust me, hackers will be all over you like a bad rash ๐Ÿคช.
 
OMG, like I'm low-key freaking out right now ๐Ÿคฏ! This is so not what we need, another way for hackers to get into our systems ๐Ÿšจ. I mean, I get it, NTLM.v1 has been around forever and some networks are just stuck in the past ๐Ÿ’ผ, but come on, can't they just update already? ๐Ÿ™„ The fact that this vulnerability is still a thing after all these years is just, like, so not cool ๐Ÿ˜’. And now Mandiant's released this rainbow table database that can crack weak passwords in under 12 hours?! ๐Ÿ•ฐ๏ธ That's like, super scary stuff ๐Ÿ’ฅ. I hope security pros are using this to educate decision-makers about the importance of upgrading their systems ASAP ๐Ÿ’ป. We need to prioritize our online safety and security, period ๐Ÿ’ฏ!
 
๐Ÿคฏ This just got worse! I mean, I knew NTLM.v1 was a weak link, but come on... $600 USD for a consumer hardware and 12 hours to crack the password? That's not even a challenge anymore ๐Ÿคฆโ€โ™‚๏ธ. It's like they're saying, "Hey, go ahead and use this insecure protocol, we've got a way to break it in no time" ๐Ÿ˜’.

I'm all for security professionals showing the world how vulnerable this is, but it's just so... unnecessary. Can't people learn from each other's mistakes instead of making it easy for hackers? ๐Ÿ’ป It's like, we're still using flip phones, and now we've got a way to crack passwords in under 12 hours ๐Ÿ“ฑ๐Ÿ’ธ.

I'm calling on all orgs out there: stop using NTLM.v1 NOW! It's not worth the risk. Get some new hardware, get some better security software... invest in yourself ๐Ÿ’ผ. Don't be one of those organizations that says "oh well, it didn't happen to me"... ๐Ÿ˜’
 
๐Ÿคฆโ€โ™‚๏ธ I'm like "yikes" when I see people still using old passwords ๐Ÿ“๐Ÿ’”. It's so easy to crack with just one of these rainbow tables ๐Ÿ”ฎ๐Ÿ’ฅ, and now it's out there in the wild ๐ŸŒช๏ธ. Organizations gotta take action ASAP ๐Ÿ’จ! It's crazy that some folks are still using Net-NTLMv1 ๐Ÿคทโ€โ™‚๏ธ after all this time โฐ. We should be using more secure stuff like two-factor authentication ๐Ÿ“ˆ๐Ÿ”’, or even just stronger passwords ๐Ÿ”—๐Ÿ’ช. It's a good thing Mandiant is helping us out by making it easier to see the problem ๐ŸŽฏ. Let's get these old systems upgraded already ๐Ÿ’ป!
 
man I'm so glad mandiant just dropped this database lol... it's like they're giving us hackers a free pass to test how weak admin passwords are rn ๐Ÿ’ฅ the fact that it can crack them in under 12 hours is insane, and the best part is that you don't need fancy hardware to do it ๐Ÿค‘ $600 usd might seem expensive for some people but trust me it's still super affordable ๐Ÿ˜… this is exactly what security pros need to show decision-makers how outdated NTLM.v1 is... I'm just glad they're not hiding this info anymore ๐Ÿ™ organizations need to step up their game and disable this protocol ASAP, anyone who doesn't is basically asking for a breach ๐Ÿšซ
 
I'm still shook by how easy it is to crack weak admin passwords ๐Ÿคฏ. I mean, I know hackers are clever and all, but $600 for consumer hardware? That's still pretty accessible for anyone looking to cause some trouble ๐Ÿ˜ฌ. And the fact that these passwords have been around for so long and are still being used in some sensitive networks just blows my mind ๐Ÿ™Œ. I feel like, come on guys! You know this stuff is ancient history by now ๐Ÿ”ฅ. It's not that hard to upgrade to something better. Mandiant did the right thing releasing this database - it's a wake-up call for all of us to prioritize security and get our act together ๐Ÿ’ป. I mean, think about it, if you're still using NTLM.v1, you might as well have a neon sign on your door saying "Hack me" ๐Ÿšจ. So yeah, let this be a warning to everyone: update those passwords already! ๐Ÿ˜…
 
I don't usually comment but I think this is super concerning ๐Ÿšจ. I mean, who uses an admin password that can be cracked in under 12 hours? Like, isn't that just basic security? ๐Ÿ’ฅ And it's not like it's a new issue or anything - Mandiant's been saying the same thing for years...

I don't know, maybe some people are just too afraid to change things up and risk messing with their systems ๐Ÿคทโ€โ™‚๏ธ. But honestly, if you're using NTLM.v1, you should just stop now and start paying attention to your security game ๐Ÿ’ป. I mean, $600 for consumer hardware might seem like a lot, but it's still way cheaper than having your entire network compromised ๐Ÿ’ธ.

I'm glad Mandiant released this database thingy - it's exactly what we need to wake people up and make them realize how vulnerable they are ๐Ÿ˜…. So yeah, organizations that haven't disabled NTLM.v1 yet... just do it, like now ๐Ÿ•ฐ๏ธ.
 
Back
Top