AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Vulnerabilities of Legacy Authentication Protocols
This chapter highlights the vulnerabilities linked to outdated authentication protocols like NTLM, particularly when security measures like multi-factor authentication are absent. The discussion also addresses the dangers posed by application passwords in inter-application communication and the risks of exposure on the Internet.