September 2003

NT PASSWORD CREATION

I cannot finish this code until next year..so
instead of keep it lying around, i thought
i'd pass it out.

The plan was to create a packet capture utility for win2k
and "audit" nt authentication hashes going over the network.
I will release mmx code sometime next year which creates 2 lanman
hashes at once speeding up an audit x 2.

bcom@hushmail.com


NTLM1 = MD4(Unicode Password)

The following is taken from L0phtcrack documentation.

  LANMAN One Way Passwords are created in the following fashion:
	. The password is first converted to uppercase
	. If the password is longer than 14 chars (bytes) then it
		is truncated
	. If the password is less than 14 chars (bytes) then it is
		padded with NULL's to 14 bytes.
	. The padded/truncated password is then split in half and each
		half is used to generate an odd parity DES key
	. An 8 byte fixed value is then encrypted with each of the
		DES keys - these two results are concatenated together
		to produce a 16byte hash.

	The fixed value that is encrypted by each of the DES keys is the 
	decryption of the value 0xAAD3B435B51404EE with a key of all zeros.


For description of NTLM2, read this Powerpoint presentation:

http://cnscenter.future.co.kr/resource/rsc-center/presentation/black-ws/2002/urity-winsec02.ppt
