Question: What are the 5 security flaws of that algorithm? Please explain your justification. ( 5 marks ) LANMAN Hash Algorithm Check password size. If the

What are the 5 security flaws of that algorithm? Please explain your justification. (5 marks)
LANMAN Hash Algorithm
Check password size. If the password is less than 15 characters, pad it to exactly 14 characters
Covert the password to uppercase letter
Divide the password to two 7 character block
Use each block as a DES key to encrypt a constant, which is KGS!@#$%
Join the two pieces together and save it in SAM database
Task 2:
Please research on MOVEit 0-day vulnerabilities. Please explain:
What is it? How can it be used? (1 mark)
Who are the target systems? (1 mark)
How many CVEs are available and how can they be used? (1 mark)
As a pen tester, how can you plan to use this vulnerability, please explain in detail (if you want to be technical, then go ahead as well)(2 marks)Please refer to the slide of LANMAN. What are the 5 security flaws of that algorithm? Please explain your justification. (5 marks)
LANMAN Hash Algorithm
Check password size. If the password is less than 15 characters, pad it to exactly 14 characters
Covert the password to uppercase letter
Divide the password to two 7 character block
Use each block as a DES key to encrypt a constant, which is KGS!@#$%
Join the two pieces together and save it in SAM database
Task 2:
Please research on MOVEit 0-day vulnerabilities. Please explain:
What is it? How can it be used? (1 mark)
Who are the target systems? (1 mark)
How many CVEs are available and how can they be used? (1 mark)
As a pen tester, how can you plan to use this vulnerability, please explain in detail (if you want to be technical, then go ahead as well)(2 marks)
 What are the 5 security flaws of that algorithm? Please explain

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!