On Nov 2, 2014, at 4:30 PM, Philip Guenther <[email protected]> wrote:

> On Sun, Nov 2, 2014 at 4:05 PM, Nex6|Bill <[email protected]> wrote:
>> I know, that “pass the hash” is now getting a lot of playtime on windows.
and
>> I have heard in a couple of talks
>> that its directly related to “SSO” part of the OS, and may be part of
posix?
>
> Nope.  It's just a bad (as in, completely broken) design for the NTLM
> and LanMan authentication protocols.

So, any machine/OS thats authenticating to a PtH vulnerable protocol namely
Lanman/NTLM would be vulnerable to this no matter the OS.

what about kerberos? (windows K5 vs Unix K5?)


>
>
>> is OpenBSD, or BSD in general vulnerable to these style attacks?
>
> The vulnerability is the authentication protocol/method, independent
> the operating system.
> If you used NTLM or LanMan password authentication on OpenBSD,  you
> would be vulnerable.
> You would also have to be insane.
>
>
>> or just the normal unix dump the password /etc/passwd table for offline
attacks sorts of
>> stuff?
>
> For the authentication methods in base, correct.

so, for OpenBSD you would have to get the /etc/passwd for an offline attack on
the password hashes
and for that they would need a user account to logon to the system. Or to have
compromised the system in such a
way as they could copy /etc/passwd.

other types of attacks would be brut force against SSHD sorts of stuff which
could be detected and mitagated.




>
>
> Philip Guenther

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]

Reply via email to