A cryptographic attack that targets NTLM or similarly weak authentication systems. An attacker can steal a hash and use the hash to authenticate again, without ever requiring the real password.
A cryptographic attack that targets NTLM or similarly weak authentication systems. An attacker can steal a hash and use the hash to authenticate again, without ever requiring the real password.