Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

NTLM decryption

Hi,

I have a capture of an ansible playbook running against a Windows server in a LAB. Ansible is configured to use NTLM authentication when talking to Windows boxes and I am trying to figure out if the windows user name/password could be reversed / decrypted. I am seeing TLS 1.3 and elliptical curves being used, do they make this communication immune to NTLM hash cracking?

Ansible: 192.168.20.138 Windows Server: 192.168.20.5

Thank you

C:\fakepath\winrm.pcap

NTLM decryption

Hi,

I have a capture of an ansible playbook running against a Windows server in a LAB. Ansible is configured to use NTLM authentication when talking to Windows boxes and I am trying to figure out if the windows user name/password could be reversed / decrypted. I am seeing TLS 1.3 and elliptical curves being used, do they make this communication immune to NTLM hash cracking?

Ansible: 192.168.20.138 Windows Server: 192.168.20.5

Thank you

C:\fakepath\winrm.pcapwinrm.pcap