There are 3 type of Hashing algo in windows:

1. LM(LAN Manager)

Important

A one-way hash function is an algorithm that takes an input (in this case, a password) and produces a fixed-size string of characters, the "hash." The core principle of a one-way hash is that it should be computationally infeasible to reverse the process—that is, to figure out the original password from the hash.

However, while the LM hash was intended to be one-way, it is critically flawed and considered broken by modern standards. Due to its significant cryptographic weaknesses, it is practically reversible.


  1. NTLM(New Technology LAN Manager)
    • Two versions :

      1. NTLMv1

        • was developed by Microsoft
        • It supports both old and new Windows version
        • It is also vulnerable to brute-force because it uses a weak DES encryption algorithm that is fast to decrypt.
      2. NTLMv2

        • uses the same flow as NTLMv1 but has 2 changes
          1. The client includes a timestamp when it sends the user name to the client
          2. The targeted server generates a variable-length challenge
        • These changes help mitigate relay attacks
        • And yet, NLTMv2 is still exposed to other NLTMv1 vuln since it is still using the same authentication mechanism.
    • NLTM follows challenge-response mechanism

      • User sends its password and also sends the challenge-response
      • If both the things are correct, then the DC will authenticate it and the user will be login

- attachments/Pasted image 20250610154804.png|700
- After this also, NTLM is vuln to:
- MITM attack
- Pass-the hash attack
- ...so on

NTLM Authentication


3. Kerberose

attachments/Pasted image 20250610191434.png|700