Ah, the good ol' LM hash. A, C, and D are classic weaknesses. As for B, I hear the hackers like to have a little 'clear text' party over the network. Where's the fun in encrypting everything?
Haha, the LM hash is like a security Swiss cheese - full of holes! A, C, and D are spot on. As for B, I think I'll just stick my head in the sand on that one.
A, C, and D all seem to be correct weaknesses of LM hashes. I'm a bit unsure about B though. Aren't the hashes supposed to be encrypted when sent over the network?
Izetta
4 days agoDeandrea
8 days agoLavonda
16 days agoIvette
19 days agoDoretha
19 days agoCarin
22 hours agoBlair
6 days agoDortha
21 days agoIvette
22 days ago