Presented by me at Sectalks BNE0x1C (29th Session)
Understanding and exploiting NTLM and insecure legacy protocol
>History
>How it works
>Uses
>Weaknesses
>Exploitation (Grabbing hashes)
>Mitigation & Protection
>How it works
>Uses
>Weaknesses
>Exploitation
>Mitigation & Protection