First Page | Document Content | |
---|---|---|
![]() Date: 2014-05-08 23:39:32Hashing Password Rainbow table Crypt Hash function MD5 Salt Hash chain LM hash Cryptography Search algorithms Cryptographic hash functions | Add to Reading List |
![]() | CIS 331 Introduction to Networks & Security February 6, 2014 Homework 2: AuthenticationDocID: 15Fve - View Document |
![]() | A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)DocID: 11Y4p - View Document |
![]() | Cryptanalysis of Microsoft’s Point-to-Point Tunneling Protocol (PPTP) Bruce Schneier Counterpane Systems, 101 East Minnehaha Parkway,DocID: 11TmH - View Document |
![]() | Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy IndustriesDocID: 11RKT - View Document |
![]() | Aurora Response RecommendationsDocID: ZdfL - View Document |