NTLM decryption

asked 2024-11-29 01:40:19 +0000

net_tech gravatar image

updated 2024-11-29 01:44:21 +0000

Hi,

I have a capture of an ansible playbook running against a Windows server in a LAB. Ansible is configured to use NTLM authentication when talking to Windows boxes and I am trying to figure out if the windows user name/password could be reversed / decrypted. I am seeing TLS 1.3 and elliptical curves being used, do they make this communication immune to NTLM hash cracking?

Ansible: 192.168.20.138 Windows Server: 192.168.20.5

Thank you

winrm.pcap

edit retag flag offensive close merge delete