Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

NLA MITM if the password is known #372

Open
obilodeau opened this issue Nov 26, 2021 · 0 comments
Open

NLA MITM if the password is known #372

obilodeau opened this issue Nov 26, 2021 · 0 comments

Comments

@obilodeau
Copy link
Collaborator

If we manage to crack the hash, we know we could MITM NLA because we could then create a new challenge-response on the server side. If I recall correctly the only thing preventing us from doing that was that part of the challenge-response mixed the plaintext password (which we don't know) with the server's public/private/fingerprint (not sure which) and that the server would reject anything tampered. We couldn't do the double diffie-hellman trick because of the mixing of both these layers. If we have the password, we can truly do an NLA handshake in the middle. This would open up a new attack use case. Note that I'm half intentionally vague here.

Ref: #358

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant