Excerpt From wi-fi vulnerabilities part 2 Webinar
Find Out More About Client Attacks: NetNTLM Hash Stealing from CTO Dr. Brett Walkenhorst.
When a client tries to access a resource, attackers can intercept the hash by using the LLMNR protocol. This could enable them to crack the resource and take resources and domain credentials. This method leaves certain network protocols open to being exploited for unauthorized access. Watch the video below to learn more about the Net NTLM hash stealing.
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access