Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Oct 2005 14:12:50 -0800
From: "Dylan Lim" <>
To: <>
Subject: ntlm session response

Hi all,

I am wondering whether it is possible for John to crack NTLM session response passwords where the authentication packets are captured over the network using network sniffers?

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ