From: Adam Shostack <adam@lighthouse.homeport.org>
To: joelm@eskimo.com (Joel McNamara)
Message Hash: 921be4c89aaa26fcb85e736a3af279821903bd218435465d3dbb04255a1ecf89
Message ID: <199511291559.KAA15633@homeport.org>
Reply To: <199511291447.GAA19250@mail.eskimo.com>
UTC Datetime: 1995-11-29 16:17:48 UTC
Raw Date: Thu, 30 Nov 1995 00:17:48 +0800
From: Adam Shostack <adam@lighthouse.homeport.org>
Date: Thu, 30 Nov 1995 00:17:48 +0800
To: joelm@eskimo.com (Joel McNamara)
Subject: Re: Microsoft weak encryption
In-Reply-To: <199511291447.GAA19250@mail.eskimo.com>
Message-ID: <199511291559.KAA15633@homeport.org>
MIME-Version: 1.0
Content-Type: text
Joel McNamara wrote:
| Peter Gutmann has an interesting article in sci.crypt, demonstrating how
| weak Microsoft's encryption is with basic access control in Windows for
| Workgroups (I'm assuming Win95 uses the same algorithm). Essentially, he
| shows how a 32-bit key is created to be passed to RC4 for encrypting .PWL
| files. I think a t-shirt is definitely in order for this.
While Peter did a nice job of showing how Windows stores
passwords, my understanding is that those passwords are decrypted by
Windows, and sent over the net in the clear. Seems much easier to
snarf them there..
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume
Return to November 1995
Return to “Joel McNamara <joelm@eskimo.com>”