📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!

What level of security do windows passwords use?

Options
Horlock
Horlock Posts: 1,027 Forumite
Please note - I don't want to know how to crack windows security at all. I just want some jargon to bandish around with a mixed audience including some techies.

I'm after something like

"Windows 7 uses a 64 bit one-way undisclosed encryption algorithm based on twofish to compare passwords with hidden key files in the boot master segment of the local hard drive"

For those of you who know what you are talking about you will know that the above sentence is nonsense. I just want a single sentence which will be lost on the majority of my audience but will bring a smile to a couple of techies and actually be correct - even though I don't care what it means.
There is no intelligent life out there ... ask any goldfish!

Comments

  • Figment
    Figment Posts: 2,643 Forumite
    Part of the Furniture Combo Breaker
    Windows 7 uses a 64 bit one-way undisclosed encryption algorithm based on twofish to compare passwords with hidden key files in the boot master segment of the local hard drive

    :whistle:
    How do I add a signature?
  • bigbmxdave
    bigbmxdave Posts: 17 Forumite
    "Windows 7 stores user passwords in a SAM file, these are much more secure than the older BILL or TRACEY file formats as it makes better use of newer file systems"

    http://en.wikipedia.org/wiki/Security_Accounts_Manager

    or you could just say you enjoy being elitist and feel the need to use confusing jargon to make yourself seem smarter?

    regards

    Dave
  • mr_fishbulb
    mr_fishbulb Posts: 5,224 Forumite
    Part of the Furniture Combo Breaker
    They are stored as one way hashes (unless you select 'Store passwords using reversible encryption’).

    The hashes are either Lan Manager (LM) hash which is crap. Or NTLM (which is a little less crappy).

    NTLM is a 128 bit MD4 hash.

    For LM the password is converted into UPPERCASE and padded out to 14 characters (it doesn't bother using any more than 14 characters). It is then split into 2 sets of 7 characters. Each of those sets are then used as a DES key to encrypt a string. The two results are then stuck back together.

    http://en.wikipedia.org/wiki/LM_hash
    http://en.wikipedia.org/wiki/NTLM

    LM was disabled by default on Vista and newer versions of Windows.


    So, my sentence would be:

    "Windows 7 uses MD4 to create a one way 128 bit hash, which is stored in a protected area called the Security Accounts Manager (SAM)"
  • Horlock
    Horlock Posts: 1,027 Forumite
    Thanks very much for this. Wonderful stuff.
    There is no intelligent life out there ... ask any goldfish!
  • fwor
    fwor Posts: 6,863 Forumite
    Part of the Furniture 1,000 Posts Name Dropper
    "Windows 7 uses MD4 to create a one way 128 bit hash, which is stored in a protected area called the Security Accounts Manager (SAM)"

    This could be a bit misleading because, although an optional method (Syskey) was introduced from NT4 onward that encrypts the SAM data, it has only ever been an option. AFAIK (please feel free to correct this) it is still only an option in all subsequent versions of Windows, and an option very few people bother to use, in my experience.

    AFAIK, by default the hashes are still stored in plain view in the Registry - which is why tools such as L0phtCrack still work today, on all versions from NT4 up to and including Win7.
  • mr_fishbulb
    mr_fishbulb Posts: 5,224 Forumite
    Part of the Furniture Combo Breaker
    fwor wrote: »
    This could be a bit misleading because, although an optional method (Syskey) was introduced from NT4 onward that encrypts the SAM data, it has only ever been an option. AFAIK (please feel free to correct this) it is still only an option in all subsequent versions of Windows, and an option very few people bother to use, in my experience.

    AFAIK, by default the hashes are still stored in plain view in the Registry - which is why tools such as L0phtCrack still work today, on all versions from NT4 up to and including Win7.
    You're right that they are in plain text in the reg, but it's "protected" in the sense that accounts can't see it (not even admin accounts). However those tools can get to the hashes by using a DLL injection with System account privileges. pwdump2 can actually get hashes when SYSKEY is used.

    I didn't say the protection was any good :)
  • tombruton87
    tombruton87 Posts: 203 Forumite
    there are tools that decrypt windows passwords instantly, never really looked into windows password cracking as its far to easy to bover. If you want to improve network security use some thing like a novel solution. I beleive they use dynamic salts and store passwords in a place that non admin users cant see like on macs
This discussion has been closed.
Meet your Ambassadors

🚀 Getting Started

Hi new member!

Our Getting Started Guide will help you get the most out of the Forum

Categories

  • All Categories
  • 351K Banking & Borrowing
  • 253.1K Reduce Debt & Boost Income
  • 453.6K Spending & Discounts
  • 244.1K Work, Benefits & Business
  • 599K Mortgages, Homes & Bills
  • 177K Life & Family
  • 257.4K Travel & Transport
  • 1.5M Hobbies & Leisure
  • 16.1K Discuss & Feedback
  • 37.6K Read-Only Boards

Is this how you want to be seen?

We see you are using a default avatar. It takes only a few seconds to pick a picture.