Open the Local Group Policy Editor and navigate to: Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options.Method 1: Restrict Outgoing NTLM Traffic Using Group Policy To avoid leaking your account credentials, you can block NTLM (allowing only Kerberos) so Windows will no longer send your NTLM credentials to remote servers. Although the credentials are not sent in clear-text, the attacker can crack them to recover your Windows password. When you try to access a web page which contains a file hosted on a SMB server, Windows automatically sends your user name and NTLM credentials to authenticate.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |