Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.
NTLM White Paper
http://www.uninformed.org/?v=3&a=2&t=pdf
I thought I'd post this whtie paper, because I found it exceptionally explanatory about NTLM Hashes, and the whole hashing process. :) Granted, NTLM Hashing is "teh sux", but still, useful to know in order to increase the security of any network using the NTLM hashing function.
wow this is cool. Is there any program out there that can quickly crack NTLM hashes as described in the paper?…'cause I could very easily get computers to login to the rogue server. Oh and if anyone is looking for a good "rogue server", the metasploit framework includes one….although, I'm not sure if it has a static challenge like described in the paper or not.