A. Passwords are converted to uppercase before hashing.
B. In older Windows systems, LM hashes were transmitted over the network, sometimes in plaintext (or easily intercepted).
D. Passwords are split into two 7-character chunks, which are hashed independently, reducing entropy.
From CEH v13 Courseware:
Module 6: Malware and Password Threats
Module 4: Windows Enumeration
Incorrect Option:
C: LM uses DES encryption with 56-bit keys (not 32-bit).
[Reference:CEH v13 Study Guide – Module 6: Weaknesses in LM HashingMicrosoft Security Documentation – LM Hashing Vulnerabilities, ==================================================================, ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit