NT Syskey Reused Keystream Vulnerability...

- AV AC AU C I A
发布: 1999-12-16
修订: 2025-04-13

The Syskey utility was included in Service Pack 3 as a means of protecting the SAM database from off-line brute-force attacks. With the previous encryption, it was possible to crack the passwords of a remote machine if a copy of its encrypted SAM databse could be obtained. There are several tools available to the public with which this can be done. Syskey added more encryption to the database, with the goal of making the calculations required to crack it too time-consuming to be feasible. Syskey creates a unique RC4 keystream for each user by incorporating the user's RID, but uses that same keystream to encrypt the LMHash and NTHash of their password (after some obfuscation of the hashes), as well as their previous two passwords (stored in the Password History part of their SAM entry). Due to this keystream re-use, it is possible to eradicate it from the formula. If the final, Syskey-encrypted hashes of the password are XORed together, the result will be the same as the XOR result...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息