disabling LM authentication

By default, Windows NT, 2000, and XP locally store legacy LAN Manager (LM) password hashes (LANMAN hashes). LM uses a weak encryption scheme to store passwords, and hackers can usually crack it in a very short period of time.

Windows stores LM hashes in the Security Account Manager (SAM) database. By default, clients have LAN Manager authentication enabled, and servers accept this authentication.

This allows workstations to send weak LM hashes across the network, making Windows authentication vulnerable to packet sniffing and reducing the amount of effort an attacker must expend to crack user passwords.

To disable this ability and better secure your workstations, follow these steps:


  1. Go to Start | Run, and enter Regedit.
  2. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\ control\LSA.
  3. Find the LMCompatibilityLevel value.

Also read : how to become a cyber security engineer 

Comments

Popular posts from this blog

Bridging Network importance in cyber operations

Open Systems Interconnection

How to Improve your Windows Deployment Strategy