Hacker news

  • Top
  • New
  • Past
  • Ask
  • Show
  • Jobs

Releasing rainbow tables to accelerate Net-NTLMv1 protocol deprecation (https://cloud.google.com)

145 points by linolevan 1 day ago | 82 comments | View on ycombinator

dbetteridge about 21 hours ago |

I recall using ntlm rainbow tables to crack windows hashes in high school in like 2008?

Amazing that this is still around and causing someone enough of a headache to justify spending money on.

Also amazing what a teenager with lots of free time and a bootable Linux usb can get up to.

londons_explore about 13 hours ago |

Really curious how this was discussed with the legal team...

"We're releasing hacking tools to allow others to break into poorly secured computer systems... But we are doing it with good intentions so it won't be illegal right??"

tialaramex about 9 hours ago |

To be vulnerable to this, what sort of dumb things are end users doing?

I couldn't immediately figure out here whether we're talking

0. Microsoft's supported products default enable this worthless "authentication" feature

1. Microsoft's supported products provide such a feature behind a UI that's not clearly marked "Danger: Do not stare into laser with remaining eye"

2: Microsoft does still support this, behind some Registry nonsense most users do not understand and once enabled it doesn't turn on the "I am a toxic waste dump, leave by nearest exit" warning signs on affected machines

3: Microsoft doesn't support this at all but some 3rd party commercial stuff does and customers really do love their crusty archaic 3rd party garbage

4: But this long abandoned SCO machine we've kept on life support for twenty years!

5: What does "supported" mean? Windows NT is scary, we're still on Windows 98 here.

archi42 about 19 hours ago |

For those interested: The SHA512 file lists 4096 files. Each file is 2 GiB. That means 8 TiB (or about 8.6 TB) of storage required.

observationist about 23 hours ago |

This empowers script kiddies, but not significantly moreso than they already were. Of all the places this is still in use, they've been exposed for years, so this isn't likely to result in a a bunch of new exploitations.

However, it's most likely to be used by governments, with legacy servers that are finicky, with filesharing set up that's impacted other computers configured for compatibility, or legacy ancient network gear or printers.

I wonder who they're pushing around, and what the motivation is?

Sytten about 19 hours ago |

Yeah that protocol is very very broken. I recently did an ntlm plugin implementation for Caido [1] and I had to fork our crypto JS module to add back MD4 and 3DES.

[1] https://github.com/caido-community/ntlm

nubskr about 13 hours ago |

Mandiant releases rainbow tables for a 25 year old broken protocol because enterprises still won't disable it. It seems like sometimes the best security tool is just making the risk impossible to ignore.

themafia about 20 hours ago |

And terrorism is just an abstract way of securing underprepared government facilities.

davidkellis about 22 hours ago |

Didn't l0phtcrack do this like 25 years ago?

BrandoElFollito about 22 hours ago |

This is like reminding that there are CVSes from 2010. Yes there are. And there are plenty of vulnerable systems.

They decided to not fix the vulns (either directly by not patching, or indirectly by not investing in cybersecurity). So exploiting them is somehow an act of mercy. They may not know they have a problem and they have an opportunity to learn.

Let's just hope they will have white or gray-ish hats teaching the lesson

1970-01-01 about 23 hours ago |

They're just dumping them out as 2GB blobs onto a cloud? Where is the zippy search UI? Very lazy behavior for the hyper giant Google.

TacticalCoder about 23 hours ago |

Holy smoke. I honestly thought the 90s called and wanted their Windows exploits back (TFA mentions 1999). I do remember talk about this from many moons ago.

But we are in two-thousand-twenty-FUCKING-six.

It's unbelievable. Just plain unbelievable.

ubuntulover2011 about 24 hours ago |

pretty cool

postepowanieadm about 23 hours ago |

Can't wait for someone to decide one of protocols used by google needs to be deprecated.

aunty_helen about 23 hours ago |

> under 12 hours using consumer hardware costing less than $600 USD

Great, so someone with half a motherboard can break this hash

bflesch about 22 hours ago |

I wonder how the Mandiant acquisition is regarded within google.

Was it a success? Is Mandiant a cash cow or was it basically an acquihire?

The big "contact mandiant" button next to the post feels a bit like trying to stay relevant and acquire more customers.

schmuckonwheels about 23 hours ago |

"To demonstrate how crappy most front door locks are, to boost our company's social media cred we will be leaving drills and a dish of bump keys at the entrance of the neighborhood."