NTLM

Techniques for stealing and abusing NTLM credentials

Last updated