In unit 2, we touched on Authorization. You can access specific objects or perform certain tasks based on your identity. Within the Windows NTFS filesystem, authorization is controlled via:

Authentication is the process of verifying your identity.

We’ll use the Active Directory environment (including your Kali Linux machine) from Unit 2 as we begin this unit. Go ahead and power up:

NTLM Authentication as a Fallback Mechanism to Kerberos

In the realm of Windows authentication protocols, Kerberos is the preferred method due to its robust security and efficiency. However, there are scenarios where Kerberos may not be applicable or available. In such cases, NTLM (NT LAN Manager) is the fallback authentication mechanism. Understanding NTLM is crucial because:

Kerberos leverages tickets and a trusted third party (the Key Distribution Center: KDC) to validate user identities securely.

NTLM relies on a challenge-response mechanism. This mechanism, though older and less secure than Kerberos, ensures that authentication can still occur even in less-than-ideal conditions.

In this section, we will explore how NTLM authentication works, its use cases, and why it remains an essential component of the Windows authentication suite despite the advent of more advanced protocols like Kerberos. You’ll find that in many penetration testing challenges, you are required to force an Active Directory environment to fall back to NTLM authentication to compromise user credentials.