How many characters is the maximum length of a LM password? - ANSWER 14
characters
What happens if a LM password is greater than 14 characters? - ANSWER LM hash will
not be created if longer than 14 characters.
How does LM store passwords? - ANSWER Converts them to uppercase, splits them
into two separate seven-character strings, and then creates a 16-character hex hash for each
string independently.
What one-way hashing algorithm does LM use? - ANSWER DES
How many bits is the key that DES uses to encrypt data? - ANSWER 56-bits
What is DES vulnerable to - ANSWER Brute-force due to small key size
What happens if a password is less than 14 characters in a LM environment? -
ANSWER LM adds blank spaces to reach 14 characters, Then the password is split into
two separate seven-character strings, which are hashed separately. If the password is less
than seven-characters, the second string will be all blank characters. An all blank DES hash
will always be AAD3B435B51404EE.
Which requires separate keys for encryption and decryption of data? -
ANSWER Asymmetric encryption
1
characters
What happens if a LM password is greater than 14 characters? - ANSWER LM hash will
not be created if longer than 14 characters.
How does LM store passwords? - ANSWER Converts them to uppercase, splits them
into two separate seven-character strings, and then creates a 16-character hex hash for each
string independently.
What one-way hashing algorithm does LM use? - ANSWER DES
How many bits is the key that DES uses to encrypt data? - ANSWER 56-bits
What is DES vulnerable to - ANSWER Brute-force due to small key size
What happens if a password is less than 14 characters in a LM environment? -
ANSWER LM adds blank spaces to reach 14 characters, Then the password is split into
two separate seven-character strings, which are hashed separately. If the password is less
than seven-characters, the second string will be all blank characters. An all blank DES hash
will always be AAD3B435B51404EE.
Which requires separate keys for encryption and decryption of data? -
ANSWER Asymmetric encryption
1