<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows domain password hashing process in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38399#M2926</link>
    <description>&lt;P&gt;You need to be a little more specific about which authentication mechanism is in use, but it will be either NTLM or more likely Kerberos. There are also subtle variations in how the mechanisms work depending on the Windows version and / or the Domain Functional Level that's been enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, some basics of how both of these mechanisms work and how to define which one is in use can be found in the link below - this will hopefully give you a good starting point:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://answers.microsoft.com/en-us/msoffice/forum/all/ntlm-vs-kerberos/d8b139bf-6b5a-4a53-9a00-bb75d4e219eb" target="_blank"&gt;https://answers.microsoft.com/en-us/msoffice/forum/all/ntlm-vs-kerberos/d8b139bf-6b5a-4a53-9a00-bb75d4e219eb&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Aug 2020 09:47:28 GMT</pubDate>
    <dc:creator>AlecTrevelyan</dc:creator>
    <dc:date>2020-08-24T09:47:28Z</dc:date>
    <item>
      <title>Windows domain password hashing process</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38393#M2925</link>
      <description>&lt;P&gt;Maybe my keyword google talents are just lacking. Continuing: I am culturally aware that a Windows AD server only keeps domain user password hashes for comparison.&amp;nbsp; I just don't know which machine performs the hash.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it typically the client which hashes, then sends the hash data to the DC?&amp;nbsp; Or (in less secure networks) is the password passed in plaintext across the network, then hashed and compared at the server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 02:37:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38393#M2925</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-08-24T02:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows domain password hashing process</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38399#M2926</link>
      <description>&lt;P&gt;You need to be a little more specific about which authentication mechanism is in use, but it will be either NTLM or more likely Kerberos. There are also subtle variations in how the mechanisms work depending on the Windows version and / or the Domain Functional Level that's been enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, some basics of how both of these mechanisms work and how to define which one is in use can be found in the link below - this will hopefully give you a good starting point:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://answers.microsoft.com/en-us/msoffice/forum/all/ntlm-vs-kerberos/d8b139bf-6b5a-4a53-9a00-bb75d4e219eb" target="_blank"&gt;https://answers.microsoft.com/en-us/msoffice/forum/all/ntlm-vs-kerberos/d8b139bf-6b5a-4a53-9a00-bb75d4e219eb&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 09:47:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38399#M2926</guid>
      <dc:creator>AlecTrevelyan</dc:creator>
      <dc:date>2020-08-24T09:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Windows domain password hashing process</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38405#M2928</link>
      <description>&lt;P&gt;That was a great starting point.&amp;nbsp; It looks like both NTLM and Kerberos perform the hash on the client, in different stages.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This wouldn't have come up at all, except I remember seeing manuals describe external VPN connections via LDAP pass authentication traffic over the network in the clear.&amp;nbsp; That raised my curiosity about internal client-server traffic, and whether Windows computers handled domain passwords the same way (or not).&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 14:08:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38405#M2928</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-08-24T14:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Windows domain password hashing process</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38428#M2930</link>
      <description>&lt;P&gt;Turns out there is A LOT going on when you enter your password into a windows machine:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://twitter.com/SteveSyfuhs/status/1297957799079510018?s=20" target="_blank"&gt;https://twitter.com/SteveSyfuhs/status/1297957799079510018?s=20&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 11:43:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Windows-domain-password-hashing-process/m-p/38428#M2930</guid>
      <dc:creator>wimremes</dc:creator>
      <dc:date>2020-08-25T11:43:06Z</dc:date>
    </item>
  </channel>
</rss>

