G
Guest
Hi,
I am working on a NT 4 - Windows 2003 Active Directory migration. I am
interested in finding out information about the hashing algorithm used when
storing user passwords in Active Directory.
The Windows 2003 AD implementation will be supporting NT 4, Windows 2000 and
XP clients so will be using Kerberos and NTLM v2 for authentication.
Does anyone know the following information:
Which algorithm is used to hash a user password before it is stored in
Windows 2003 Active Directory (via Kerberos and NTLM v2)?
Does Windows 2003 use salting before applying the hash? (i.e add the user
id to the password before hashing)
How many times is the hash applied to the password when encrypting the
password in Windows 2003 Active Directory?
Also could you point me to resources to confirm this, I cannot seem to find
resources on the web that defines this.
Thanks in advance.
S
I am working on a NT 4 - Windows 2003 Active Directory migration. I am
interested in finding out information about the hashing algorithm used when
storing user passwords in Active Directory.
The Windows 2003 AD implementation will be supporting NT 4, Windows 2000 and
XP clients so will be using Kerberos and NTLM v2 for authentication.
Does anyone know the following information:
Which algorithm is used to hash a user password before it is stored in
Windows 2003 Active Directory (via Kerberos and NTLM v2)?
Does Windows 2003 use salting before applying the hash? (i.e add the user
id to the password before hashing)
How many times is the hash applied to the password when encrypting the
password in Windows 2003 Active Directory?
Also could you point me to resources to confirm this, I cannot seem to find
resources on the web that defines this.
Thanks in advance.
S