GeekyChick wrote: » I may not be asking this right but why do hackers need the actual password instead of using a password hash to login?
GeekyChick wrote: » So the Salt is just an extra protection for the hash that makes sense.
kurosaki00 wrote: » Salt is random, so even with the same hash, the password will be different.
destroy8383 wrote: » Are you talking about passing the hash? Here's some insight on thathttps://www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283
Nik 99 wrote: » This thread was well worth reading. I'm also studying for my security+ and this one confused me too. I figured all an attacker would have to do was intercept the hash and use it themselves to gain access. Makes so much more sense that the hashing is done on the server end and that trying to enter a hashed password would generate an altogether different hash. I've got another hash related question though. From what I remember reading, CHAP and MS-CHAP do not send passwords/credentials as cleartext, instead they hash the passwords first then send it off. There must be more to the explaination because this suffers the same problem of an attacker using the intercepted hash to login. Can someone explain this one to me?
GeekyChick wrote: » My question is why can't someone just intercept or get your hash and use it to login to a site, say Amazon for example? Why is the actual password needed when that's not even what is stored? Are hashes not really used? What am I missing?
paul78 wrote: » It's probably outside the context of Sec+ but there are attack vectors which do not require the actual password. Some weaker protocols such as NTLM as susceptible to pass-the-hash attacks.
gespenstern wrote: » More on this here: https://msdn.microsoft.com/en-us/library/cc236699.aspx
gespenstern wrote: » More on this here: https://msdn.microsoft.com/en-us/library/cc236699.aspx .