Results 1 to 3 of 3

Thread: Authentication protocal weaknesses

  1. #1
    Senior Member
    Join Date
    May 2004
    Posts
    274

    Authentication protocal weaknesses

    Hi all,
    can some one help me in sorting out that how cain and ettercap sniff authentication protocols (not arp poisoning etc) how they decrypt them as i didnot find any technical information on their sites. The concept and the weakness in protocols and how they exploit those protocol weakness.

    Thanks
    Excuse me, is there an airport nearby large enough for a private jet to land?

  2. #2
    Master-Jedi-Pimps0r & Moderator thehorse13's Avatar
    Join Date
    Dec 2002
    Location
    Washington D.C. area
    Posts
    2,885
    I assume you are asking about the way that CAIN decrypts MS Terminal Services strong encryption? If so, the answer is much simpler than you think. MS embedded the key in a DLL file which CAIN simply grabs and uses for the decrypt. No magic here.
    Our scars have the power to remind us that our past was real. -- Hannibal Lecter.
    Talent is God given. Be humble. Fame is man-given. Be grateful. Conceit is self-given. Be careful. -- John Wooden

  3. #3
    Senior Member
    Join Date
    May 2004
    Posts
    274
    Thanks for the reply,
    i was also looking for ssh, ssh2, kerberos et. Not only for MS Terminal Services.


    Thanks
    Excuse me, is there an airport nearby large enough for a private jet to land?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •