systems by disabling LM authentication

 Requiring your users to use complex passwords and enforcing that policy is useless if you authenticate and locally store easily cracked password files.


By default, Windows NT, 2000, and XP locally store legacy LAN Manager (LM) password hashes (LANMAN hashes). LM uses a weak encryption scheme to store passwords, and hackers can usually crack it in a very short period of time.

Windows stores LM hashes in the Security Account Manager (SAM) database. By default, clients have LAN Manager authentication enabled, and servers accept this authentication.

This allows workstations to send weak LM hashes across the network, making Windows authentication vulnerable to packet sniffing and reducing the amount of effort an attacker must expend to crack user passwords.

To disable this ability and better secure your workstations, follow these steps:


  1. Go to Start | Run, and enter Regedit.
  2. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\ control\LSA.
  3. Find the LMCompatibilityLevel value.

Comments

Popular posts from this blog

Bridging Network importance in cyber operations

Open Systems Interconnection

How to Improve your Windows Deployment Strategy