This story is on Ars Technica today, where it might get a bit more exposure:
http://arstechnica.com/security/2012/07/broken-microsoft-sheme-exposes-traffic/
- Harald
___
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mai
On 04/03/2012 02:29 PM, Marsh Ray wrote:
Therefore, from any packet capture of a PPTP session which includes the
initial handshake, a brute force of the response yields the complete NT
hash with complexity 2^57.
The NT hash is a password-equivalent, and it represents the only secret
material t
On 04/03/2012 02:29 PM, Marsh Ray wrote:
Therefore, from any packet capture of a PPTP session which includes the
initial handshake, a brute force of the response yields the complete NT
hash with complexity 2^57.
The NT hash is a password-equivalent, and it represents the only secret
material t