Mandiant Publishes Precomputed Tables That Slash NTLMv1 Crack Time to ~12 Hours
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Microsoft to Ship Windows with NTLM Blocked by Default, Pressing Enterprises to Migrate to Kerberos (US)
Microsoft will ship upcoming Windows Server and Windows 11 releases with NTLM network authentication blocked by default and new telemetry to reveal remaining dependencies. The urgency of the change is heightened by recent releases of precomputed tables that dramatically shorten the time to recover NTLMv1-protected credentials, increasing the risk profile for organizations that continue to accept legacy negotiations.

Server-side attacks undermine password managers’ ‘zero-knowledge’ assurances
Researchers from ETH Zurich and USI Lugano demonstrate that a fully compromised password-manager server can be manipulated to exfiltrate or alter user vaults when recovery, sharing, or legacy-support features are enabled. The paper details 25 practical exploits against Bitwarden, LastPass, and Dashlane that include public‑key substitution, padding‑oracle decryption, and iteration‑count downgrades.


