发布彩虹表以加速协议弃用
Releasing rainbow tables to accelerate Net-NTLMv1 protocol deprecation

原始链接: https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables

曼迪安发布了一份全面的Net-NTLMv1彩虹表数据集,以突出这种存在数十年的不安全身份验证协议持续构成的风险。尽管自2012年起已被弃用(漏洞自1999年已知),但Net-NTLMv1在许多环境中仍然出乎意料地普遍存在。 此次发布大大降低了演示该协议弱点的门槛。以前需要昂贵的硬件或第三方服务,现在这些表允许安全专业人员使用现成的消费级硬件(低于600美元)在12小时内破解哈希。 这些表利用了已知的明文攻击,在攻击者获得没有扩展会话安全性的Net-NTLMv1哈希时恢复密码哈希。成功利用可能导致权限提升,以及关键的,通过DCSync攻陷域控制器。 该数据集可通过Google Cloud获得,并包含用于验证的校验和。曼迪安鼓励防御者利用这些表主动识别并**禁用Net-NTLMv1**,并缓解身份验证强制攻击,强调采取协作方法来消除这一重大的安全威胁。

谷歌发布了彩虹表——用于破解密码的预计算表——以加速淘汰较旧的不安全协议。这一举动,仅需不到600美元的消费级硬件即可实现,凸显了这些遗留系统的脆弱性。 Hacker News上的评论员指出谷歌过去淘汰不安全协议的经历,这与忽视安全漏洞的公司形成了鲜明对比。然而,一些人预计协议淘汰到实际移除之间可能需要很长时间——可能长达20年。 一位评论员巧妙地将此次发布比作公开展示锁的弱点以推广安防公司,而另一些人则简单地承认这是破解能力的一次“酷炫”演示。讨论的中心在于平衡安全改进与维护旧系统的现实。
相关文章

原文

Introduction

Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. Despite Net-NTLMv1 being deprecated and known to be insecure for over two decades—with cryptanalysis dating back to 1999—Mandiant consultants continue to identify its use in active environments. This legacy protocol leaves organizations vulnerable to trivial credential theft, yet it remains prevalent due to inertia and a lack of demonstrated immediate risk.

By releasing these tables, Mandiant aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1. While tools to exploit this protocol have existed for years, they often required uploading sensitive data to third-party services or expensive hardware to brute-force keys. The release of this dataset allows defenders and researchers to recover keys in under 12 hours using consumer hardware costing less than $600 USD. This initiative highlights the amplified impact of combining Mandiant's frontline expertise with Google Cloud's resources to eliminate entire classes of attacks.

This post details the generation of the tables, provides access to the dataset for community use, and outlines critical remediation steps to disable Net-NTLMv1 and prevent authentication coercion attacks.

Background

Net-NTLMv1 has been widely known to be insecure since at least 2012, following presentations at DEFCON 20, with cryptanalysis of the underlying protocol dating back to at least 1999. On Aug. 30, 2016, Hashcat added support for cracking Data Encryption Standard (DES) keys using known plaintext, further democratizing the ability to attack this protocol. Rainbow tables are almost as old, with the initial paper on rainbow tables published in 2003 by Philippe Oechslin, citing an earlier iteration of a time-memory trade-off from 1980 by Martin Hellman.

Essentially, if an attacker can obtain a Net-NTLMv1 hash without Extended Session Security (ESS) for the known plaintext of 1122334455667788, a cryptographic attack, referred to as a known plaintext attack (KPA), can be applied. This guarantees recovery of the key material used. Since the key material is the password hash of the authenticating Active Directory (AD) object—user or computer—the attack results can quickly be used to compromise the object, often leading to privilege escalation.

A common chain attackers use is authentication coercion from a highly privileged object, such as a domain controller (DC). Recovering the password hash of the DC machine account allows for DCSync privileges to compromise any other account in AD.

Dataset Release

The unsorted dataset can be downloaded using gsutil -m cp -r gs://net-ntlmv1-tables/tables . or through the Google Cloud Research Dataset portal

The SHA512 hashes of the tables can be checked by first downloading the checksums gsutil -m cp gs://net-ntlmv1-tables/tables.sha512 . then checked by sha512sum -c tables.sha512. The password cracking community has already created derivative work and is also hosting the ready to use tables.

Use of the Tables

Once a Net-NTLMv1 hash has been obtained, the tables can be used with historical or modern reinventions of rainbow table searching software such as rainbowcrack (rcrack), or RainbowCrack-NG on central processing units (CPUs) or a fork of rainbowcrackalack on graphics processing units (GPUs). The Net-NTLMv1 hash needs to be preprocessed to the DES components using ntlmv1-multi as shown in the next section.

Obtaining a Net-NTLMv1 Hash

Most attackers will use Responder with the --lm and --disable-ess flags and set the authentication to a static value of 1122334455667788 to only allow for connections with Net-NTLMv1 as a possibility. Attackers can then wait for incoming connections or coerce authentication using a tool such as PetitPotam or DFSCoerce to generate incoming connections from DCs or lower privilege hosts that are useful for objective completion. Responses can be cracked to retrieve password hashes of either users or computer machine accounts. A sample workflow for an attacker is shown below in Figure 1, Figure 2, and Figure 3.

联系我们 contact @ memedata.com