password hashes
hello,
in format stored password hashes on domain controller's (2008r2 , 2012r2)?
this old weak ntlmv2 hash, or new format?
the below from:
http://www.ntdsxtract.com/downloads/activedirectoryofflinehashdumpandforensics.pdf
the solution introduced microsoft in order provide protection complex and
composed of 3 layers of encryption of 2 layers use rc4 , third layer uses des.
in order decrypt hash stored in ntds.dit following steps necessary:
1. decrypt pek (password encryption key) bootkey (rc4 - layer 1)
2. hash decryption first round (with pek , rc4 - layer 2)
3. hash decryption second round (des - layer 3)
paul bergson
mvp - directory services
mcitp: enterprise administrator
mcts, mct, mcse, mcsa, security, bs csci
2012, 2008, vista, 2003, 2000 (early achiever), nt4
twitter @pbbergs http://blogs.dirteam.com/blogs/paulbergson
please no e-mails, questions should posted in newsgroup.
posting provided no warranties, , confers no rights.
Windows Server > Directory Services
Comments
Post a Comment