NTLM decryption
Hi,
I have a capture of an ansible playbook running against a Windows server in a LAB. Ansible is configured to use NTLM authentication when talking to Windows boxes and I am trying to figure out if the windows user name/password could be reversed / decrypted. I am seeing TLS 1.3 and elliptical curves being used, do they make this communication immune to NTLM hash cracking?
Ansible: 192.168.20.138 Windows Server: 192.168.20.5
Thank you