password hashes


hello,

in format stored password hashes on domain controller's (2008r2 , 2012r2)?

this old weak ntlmv2 hash, or new format?

the below from:
http://www.ntdsxtract.com/downloads/activedirectoryofflinehashdumpandforensics.pdf

the solution introduced microsoft in order provide protection complex and
composed of 3 layers of encryption of 2 layers use rc4 , third layer uses des.
in order decrypt hash stored in ntds.dit following steps necessary:
1. decrypt pek (password encryption key) bootkey (rc4 - layer 1)
2. hash decryption first round (with pek , rc4 - layer 2)
3. hash decryption second round (des - layer 3)


paul bergson
mvp - directory services
mcitp: enterprise administrator
mcts, mct, mcse, mcsa, security, bs csci
2012, 2008, vista, 2003, 2000 (early achiever), nt4
twitter @pbbergs http://blogs.dirteam.com/blogs/paulbergson
please no e-mails, questions should posted in newsgroup.
posting provided no warranties, , confers no rights.



Windows Server  >  Directory Services



Comments

Popular posts from this blog

2008 Windows Deployment Server Properties Error

Can no longer user MS Update - Files required to use Microsoft Update are no longer registered

How do a find data in one file, search for it in another file and if not found, write a custom message to another file