Password Representation Flashcards

1
Q

Passwords are stored in these two formats in Windows

A

LANMAN and NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NT, 2000,XP, 2003 use this hash

A

LANMAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows Vista and later use this hash

A

NTLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows hashes are stored locally where

A

SAM database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domain Controllers store hashes where

A

ntds.dit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LANMAN hashes max character limit

A

14 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

if LANMAN hash is < 14 characters it does what

A

fixed padding it with null byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LANMAN converts password to what

A

upper case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LANMAN split the password into

A

two 7 bit halves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

whats the weakest part of LANMAN hashes

A

splitting into two 7 character pieces easier to crack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

LANMAN uses each 7 bit piece and how does it encrypt it

A

use each piece as a DES key to encrypt a constant with one round of DES. fixed constant hard coded into LANMAN algorithm then concatenates each piece

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is there ever an 13 character LAN man password

A

No its a 7 character password and and 6 character other password. attack each sides independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NT Hash is how many characters long

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NT Hash is not split up and requires only one round of

A

MD4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LANMAN and NT Hashes are not salted T or F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When authenticating over the network what is used

A
Challenge responses:
LANMAN Challenge/Response
NTLM v1
NTLM v2
Kerberos
17
Q

LANMAN Hash Challenge response -
Client sends authentication request with username in __________
Server sends a pseudo random challenge request to client
Client takes users hash to transform mathematically the challenge into a response

A

cleartext

18
Q

Client forms response for from challenge padding to ___ bytes and splits into ___ ___byte pieces

A

21
3
7

19
Q

In NTLMv2 the client uses the NT hash as a key in the

A

HMAC-MD5 to hash the username and domain name

20
Q

In NTLMv2 uses the result of the username and domain name hashed is used as a key in another round of HMAC-MD5 this time with it applied to

A

server challenge
timestamp
client challenge in pseudo random fashion
which produces the NTLMv2 response and client challenge

21
Q

Modern Linux/Unix MD5-based Password schemes
use any length password and a ______. These are hashed together using the _____ algorithm. The result is then hashed with the original password and _____ for thousand iterations mixing orders of result, password, and ______. stored in /etc/shadow or /etc/password preceded with ____ and a _____ with another $.

A
salt
MD5
salt
salt
$1$
salt,
22
Q

Traditional DES-based scheme - users password is truncated to __ characters. Then bit is removed from each character to make them 7 bit ASCII representations, yielding ___ bits.
Result is used as a DES key to encrypt a constant block of ___ bits all set to ___. A salt is to create an interim result then the ___ bit DES key is perturbed by the ____ for ____ times.

A
8
56
64
0
56
salt
25