I've got 3 computers running Windows 2000 Pro on my home network with multiple shared directories. I allow only admin access to these directories -- however, I'm concerned about passing my admin password for authentication as all traffic is passed over my wireless network, using WEP encryption. In the event that someone were capturing my traffic, able to crack the WEP key, and decrypt the traffic, would they then be able to view my admin passwords? Or is SMB authentication further encrypted?
From what I gather, NTLM encryption is used for authentication in Active Directory environments, but I don't think this is the case on a home network with just a couple Win2k Pro hosts.
?
Thanks a lot for your thoughts..
(here's what I've found about AD environment authentication🙂
---------------------------------------------------------------------------------------------------
MS Windows clients may use encrypted passwords as part of a challenge/response authentication model (a.k.a. NTLMv1 and NTLMv2) or alone, or clear-text strings for simple password-based authentication. It should be realized that with the SMB protocol, the password is passed over the network either in plain-text or encrypted, but not both in the same authentication request.
When encrypted passwords are used, a password that has been entered by the user is encrypted in two ways:
* An MD4 hash of the unicode of the password string. This is known as the NT hash.
* The password is converted to upper case, and then padded or truncated to 14 bytes. This string is then appended with 5 bytes of NULL characters and split to form two 56-bit DES keys to encrypt a ?magic? 8-byte value. The resulting 16 bytes form the LanMan hash.
MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x and version 4.0 pre-service pack 3 will use either mode of password authentication. All versions of MS Windows that follow these versions no longer support plain text passwords by default.
---------------------------------------------------------------------------------------------------
From what I gather, NTLM encryption is used for authentication in Active Directory environments, but I don't think this is the case on a home network with just a couple Win2k Pro hosts.
?
Thanks a lot for your thoughts..
(here's what I've found about AD environment authentication🙂
---------------------------------------------------------------------------------------------------
MS Windows clients may use encrypted passwords as part of a challenge/response authentication model (a.k.a. NTLMv1 and NTLMv2) or alone, or clear-text strings for simple password-based authentication. It should be realized that with the SMB protocol, the password is passed over the network either in plain-text or encrypted, but not both in the same authentication request.
When encrypted passwords are used, a password that has been entered by the user is encrypted in two ways:
* An MD4 hash of the unicode of the password string. This is known as the NT hash.
* The password is converted to upper case, and then padded or truncated to 14 bytes. This string is then appended with 5 bytes of NULL characters and split to form two 56-bit DES keys to encrypt a ?magic? 8-byte value. The resulting 16 bytes form the LanMan hash.
MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x and version 4.0 pre-service pack 3 will use either mode of password authentication. All versions of MS Windows that follow these versions no longer support plain text passwords by default.
---------------------------------------------------------------------------------------------------