Cracking Passwords for $600: The Mandiant NTLMv1 rainbow table database Release
Mandiant has released an NTLMv1 rainbow table database, allowing passwords to be cracked in under 12 hours with $600 hardware. A wake-up call for legacy security.
Legacy security just met its executioner. Cybersecurity firm Mandiant has released a massive rainbow table database designed to crack any administrative password protected by Microsoft’s aging NTLMv1 hashing algorithm.
Mandiant NTLMv1 rainbow table database: A death sentence for legacy auth
By making this database public, Mandiant is essentially forcing the hands of IT administrators who haven't yet migrated to more secure protocols. NTLMv1 has been known to be weak for over two decades, but its limited keyspace makes it an easy target for precomputed hash matching. Mandiant’s release drastically lowers the barrier to entry for such attacks.
| Metric | Requirement / Result |
|---|---|
| Hardware Cost | Under $600 USD |
| Cracking Time | Less than 12 hours |
| Platform | Google Cloud |
| Target | Net-NTLMv1 (SMB, Network Auth) |
New ammo for security professionals and hackers alike
According to Mandiant, the database allows researchers to recover passwords in under 12 hours using consumer-grade hardware. While intended as a tool for defenders to prove vulnerabilities, it’s equally accessible to malicious actors. The data specifically targets Net-NTLMv1 passwords used in network authentication, such as SMB file sharing.
This content is AI-generated based on source articles. While we strive for accuracy, errors may occur. We recommend verifying with the original source.
Related Articles
94 million Americans trust password managers with their most sensitive data based on 'zero knowledge' promises. New research reveals these assurances aren't as bulletproof as claimed.
Companies split on OpenClaw AI tool - revolutionary productivity booster or security nightmare? From Silicon Valley startups to Meta, executives are drawing battle lines.
The European Parliament banned AI tools over security concerns, but this move reflects deeper tensions about US tech dominance and data sovereignty in an unpredictable political climate.
The Moltbook incident revealed how easily humans could impersonate AI agents, exposing critical security flaws in OpenClaw. What this means for the future of autonomous AI systems.
Thoughts
Share your thoughts on this article
Sign in to join the conversation