!!! Overview [{$pagename}] ([NT LAN Manager] ([NTLM]) is a binary messaging protocol used by the [Microsoft] [Security Support Provider Interface] ([SSPI]) to facilitate [NTLM] [Challenge-response] [authentication]. %%warning The security of [NTLMv1], [NTLMv2] and [MD4] and therefore all versions of [{$pagename}] has been __severely__ compromised and is considered [Cryptographically Weak] and lacks [Collision Resistance]. %% [Windows Server 2003] supports the [NTLM] [Security Support Provider], Msv1_0.dll, to enable clients running [versions] of [Microsoft Windows] earlier than [Windows Server 2000] to [authenticate]. [NTLM] is the default [authentication protocol|Authentication Method] for [Windows NT] 4.0. The [NTLM] [Security Support Provider] includes the [NTLM and NTLMv2 authentication protocols|NTLM]. [Windows Server 2003] can use the [NTLM] [Security Support Provider] for the following: * Client/server authentication * Print services * File access using [CIFS]/[SMB] * Secure [RPC]/DCOM-based services [{$pagename}] is used wherever [SSPI] [authentication] is used including [Server Message Block] / [Common Internet File System] ([CIFS]) extended security authentication, [HTTP] Negotiate authentication (e.g. IIS with IWA turned on) and [MSRPC] services. The NTLMSSP and NTLM challenge-response protocol have been documented in Microsoft's Open Protocol Specification.[1] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [NTLMSSP|Wikipedia:NTLMSSP|target='_blank'] - based on information obtained 2017-07-26 * [#2] - [NTLMSSP|https://docs.microsoft.com/en-us/windows/win32/com/ntlmssp|target='_blank'] - based on information obtained 2020-07-26