Security Firm Mandiant Releases Rainbow Table to Crack Weak Admin Passwords in Under 12 Hours
In a move aimed at nudging users who continue to use the deprecated NTLMv1 hashing function, security firm Mandiant has released a rainbow table that can crack weak admin passwords in under 12 hours using consumer hardware costing less than $600 USD.
The database, known as an NTLMv1 rainbow table, is a precomputed table of hash values linked to their corresponding plaintext. This generic table allows hackers to take over accounts by quickly mapping a stolen hash to its password counterpart. The limited keyspace of the NTLMv1 hashing function makes it particularly easy to construct such tables.
Despite being well-known for its weaknesses, NTLMv1 remains in use in some sensitive networks due to inertia and a lack of demonstrated immediate risk. Microsoft only announced plans to deprecate the protocol last August, but Mandiant consultants continue to identify its use in active environments.
The release of the rainbow table is intended to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. While tools to exploit this protocol have existed for years, they often required uploading sensitive data to third-party services or expensive hardware to brute-force keys.
Using the newly released database, defenders and researchers can now recover passwords in under 12 hours using consumer-grade hardware. This move provides added ammunition for security professionals when trying to convince decision-makers to migrate from the insecure function.
Microsoft released NTLMv1 in the 1980s with the release of OS/2 and later exposed its weaknesses through research by cryptanalyst Bruce Schneier and Mudge in 1999. The protocol was eventually replaced by NTLMv2, which fixed the weakness. However, organizations that rely on Windows networking are still vulnerable to trivial credential theft due to inertia and a lack of demonstrated immediate risk.
The tables first assist attackers in providing per-byte hash results with the known plaintext challenge 1122334455667788. This allows them to compromise accounts using single DES with 56 bits of the user's secret key at a time. While NTLMv2 is still weak, it is not subject to rainbow tables due to its response function including 64 bits of random entropy supplied by the client.
Organizations that fail to heed this warning will have only themselves to blame if they get hacked. Mandiant advises organizations to immediately disable the use of Net-NTLMv1 and provide basic steps required to move off of the insecure function, linking to more detailed instructions.
In a move aimed at nudging users who continue to use the deprecated NTLMv1 hashing function, security firm Mandiant has released a rainbow table that can crack weak admin passwords in under 12 hours using consumer hardware costing less than $600 USD.
The database, known as an NTLMv1 rainbow table, is a precomputed table of hash values linked to their corresponding plaintext. This generic table allows hackers to take over accounts by quickly mapping a stolen hash to its password counterpart. The limited keyspace of the NTLMv1 hashing function makes it particularly easy to construct such tables.
Despite being well-known for its weaknesses, NTLMv1 remains in use in some sensitive networks due to inertia and a lack of demonstrated immediate risk. Microsoft only announced plans to deprecate the protocol last August, but Mandiant consultants continue to identify its use in active environments.
The release of the rainbow table is intended to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. While tools to exploit this protocol have existed for years, they often required uploading sensitive data to third-party services or expensive hardware to brute-force keys.
Using the newly released database, defenders and researchers can now recover passwords in under 12 hours using consumer-grade hardware. This move provides added ammunition for security professionals when trying to convince decision-makers to migrate from the insecure function.
Microsoft released NTLMv1 in the 1980s with the release of OS/2 and later exposed its weaknesses through research by cryptanalyst Bruce Schneier and Mudge in 1999. The protocol was eventually replaced by NTLMv2, which fixed the weakness. However, organizations that rely on Windows networking are still vulnerable to trivial credential theft due to inertia and a lack of demonstrated immediate risk.
The tables first assist attackers in providing per-byte hash results with the known plaintext challenge 1122334455667788. This allows them to compromise accounts using single DES with 56 bits of the user's secret key at a time. While NTLMv2 is still weak, it is not subject to rainbow tables due to its response function including 64 bits of random entropy supplied by the client.
Organizations that fail to heed this warning will have only themselves to blame if they get hacked. Mandiant advises organizations to immediately disable the use of Net-NTLMv1 and provide basic steps required to move off of the insecure function, linking to more detailed instructions.