In this post, we discuss our work in cracking the hashed passwords being sent over NLA connections to ascertain those supplied by threat actors.
Article Link: Cracking RDP NLA Supplied Credentials for Threat Intelligence – NCC Group Research
In this post, we discuss our work in cracking the hashed passwords being sent over NLA connections to ascertain those supplied by threat actors.
Article Link: Cracking RDP NLA Supplied Credentials for Threat Intelligence – NCC Group Research