NTLMv1 Protocol Weaknesses and Attacks
2024-05-24
If you've spent some time in the cybersecurity field, you might have come across NTLMv1. This authentication protocol, while once widely used, has fundamental weaknesses that make it an attractive target for attackers. In this blog post, we will explore these weaknesses and how they can be exploited.
NTLMv1
Auth Coercion
Relaying
Cracking
RBCD
Domain Compromise