RAINBOW TABLES LM & NTLM HASHES	     By:-			Rahul Sharma			   TE COMPUTERS		    T3224245
How Windows Store Passwords??LM “hashes”
Old technology used on LAN Manager
NT hashes
Unicode password or MD4 hash
Used for authentication on more recent Windows systemsHow a Hash looks Like??E52CAC67419A9A224A3B108F3FA6CB6D
LM “Hash” Generation
how to create the hash
LM hashes
Overview
Proof that case doesn’t matterPassword = E52CAC67419A9A22  4A3B108F3FA6CB6D PaSSwORd = E52CAC67419A9A22  4A3B108F3FA6CB6D Password1 = E52CAC67419A9A22  38F10713B629B565
NTLM HASHESUses MD4 algorithm to create a hash of the mixed-case passwordResults in a 16 byte hash of the password (stored in the SAM…)Used for any password greater than 14 characters
NTLM HASH
Proof that case DOES matterPassword = F15ABD57801840F3348DDCCAFB677F6A PaSSwORd = 17504CE07C0A0D4A1BD3A99A0821F957 Password1 = F9A3152D926F9FF898D0BAFBA0BFFD30
NTLM Hash ConsiderationsCase preservingMaximum length = 127 charactersBetter Security than LM HashesNumber of ≤14-character password (full char set) ≈ 2.7*1067Number of 127-character passwords ≈ 4.9*10611
ATTACKS ON PASSWORDS….
What is a Brute Force Attack?
Types of Brute Force attacks:                   Online B.F.                 Offline B.F.Can be prevented :-limit number of login attempts
ReduceHashHashReduceReduce
Algorithm followed:-
HashReduceReduceHashReduceHashReduceHash
IS THIS EFFECTIVE???
How to prevent rainbow tables from cracking passwords??
What is SALT??Special text or code.It does password strengtheningSOME FACTS:-Windows doesn't salt its hash!
This makes it possible to speed up password cracking with precomputed Rainbow Tables
LINUX uses SALT….PROOFHere are two accounts on a Windows 7 Beta machine with the password 'password'This hash is from a different Windows 7 Beta machine

Password Cracking