Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity 101
NTLM 101: The Basics and the Risk

NTLM 101: The Basics and the Risks

Published: 6/25/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

For IT professionals and security-conscious organizations, understanding this aging protocol, how it works, and why it’s still lurking on your network is more crucial than you might think. This blog is all about shining a light on NTLM’s inner workings, recognizing its risks and benefits, and offering practical advice for safeguarding your environment.

Read on as we strip away the jargon to explain what NTLM is, how it authenticates users, how it compares to Kerberos, and why it continues to matter—even as modern threats grow more sophisticated.

What is NTLM?

NTLM stands for New Technology LAN Manager. Developed by Microsoft, NTLM is a suite of security protocols designed to authenticate users on networks running Windows operating systems. At its core, NTLM provides a means to confirm someone’s identity without constantly demanding their password, making it an early player in the realm of single sign-on (SSO).

NTLM was the standard protocol for Windows domains up until Windows 2000, when Kerberos took over by default. Yet NTLM is still part of today’s Windows systems, mainly for legacy compatibility reasons. That means if your network has old applications or clients, odds are NTLM is still somewhere in the authentication chain.

Quick facts about NTLM

  • Developed for Microsoft Windows environments

  • Relies on a challenge-response mechanism

  • Still present in many networks to support older systems

  • Replaced by Kerberos in newer Active Directory domains, but not fully retired

Understanding NTLM’s challenge-response process

Authentication protocols can seem like a maze, but NTLM’s process breaks down into a straightforward three-step handshake between client and server. The main goal? Prove user identity without sending passwords over the network.

Step-by-step NTLM authentication

Here’s what happens when you attempt to log in using NTLM:

  • Negotiation

The client (your computer) starts a conversation with the server, listing NTLM as an authentication option.

  • Challenge

The server responds with a random “challenge”—a unique 16-byte number.

  • Response

The client, using the user’s password (or rather, a hash of it), encrypts the challenge and sends this “response” back to the server.

  • Verification

The server forwards the username, challenge, and response to the domain controller.

The domain controller retrieves the user’s stored password hash, uses it to encrypt the challenge again, and compares its result to the client’s response.

  • Access Granted (or Denied)

If the encrypted responses match, authentication is a success. If not, access is blocked.

Key points

  • The real password never travels the network in plain text.

  • Rather, password hashes are used to encrypt proof that the user knows the password.

  • This prevents eavesdropping but, as we’ll see, is far from bulletproof.

What is NTLM used for?

Despite its age, NTLM’s roots are still embedded in the fabric of many corporate networks. You’ll find NTLM used in situations such as:

  • Authenticating devices running old versions of Windows (Windows 95/98/NT)

  • Allowing modern servers to talk to outdated clients or applications that don’t support Kerberos

  • Handling local logons on standalone systems or non-domain-joined machines

  • Acting as a fallback method when Kerberos fails

Nobody sets out to rely on an old authentication protocol, but supporting legacy systems and complex networks can make a total phase-out difficult. Think of NTLM as the stubborn relative at a family reunion; it might not be the life of the party, but you can’t just show it the door.

Breaking down the NTLM authentication process

NTLM’s core mechanism is the challenge-response handshake, as mentioned earlier, but there are nuances worth understanding.

Inside the NTLM handshake

  • Credentials gathering

Users enter their username, password, and domain into their device.

  • Hashing

The client creates a hash of the password (not the plaintext) and immediately gets rid of the actual password.

  • Initiation

The client sends just the username to the server.

  • Random challenge

The server throws down a 16-byte random number, daring the client to prove their identity.

  • Encrypted response

The client encrypts this challenge using the password hash, then sends the result as a response.

  • Third-party verification

The server checks with the domain controller, which encrypts the challenge with its own copy of the user’s hash.

  • Match and approve

If the hashes line up, access is allowed.

On the surface, NTLM keeps passwords off the network, favoring hashed comparisons. However, this method has aged poorly, making it a tempting target for modern attackers.

NTLM vs Kerberos: What’s the real difference?

If NTLM is the defender stuck in the past, Kerberos is the fast, modern alternative Microsoft now trusts by default.

The approach

NTLM

  • Uses a challenge-response (three-message) exchange, validating identity each time for each resource.

Kerberos

  • Implements a “ticketing” system managed by a Key Distribution Center (KDC). After initial login, users get a ticket (session key) granting access for a defined period, reducing repeated password usage.

Encryption

NTLM

  • Relies on password hashing, which, if stolen, can be abused by attackers in “pass-the-hash” techniques.

Kerberos

  • Uses strong encryption. Both tickets and authenticators are encrypted, making credential theft much less exploitable.

Security

NTLM

  • No support for multifactor authentication

  • Vulnerable to brute-force and pass-the-hash attacks

  • Lacks salting on password hashes

Kerberos

  • Built around encrypted ticket-granting services

  • The default for Active Directory domains

  • Modern, flexible, and more resilient to most types of credential attacks

NTLM’s main flaw lies in how it handles password hashes and authentication. Without “salting” (adding random data to hashes), attackers with access to password hashes can impersonate users, with no need for the real password. This makes brute-force cracking and pass-the-hash attacks dangerously effective.

Add to that the static, simplistic cryptography of NTLM and lack of multifactor authentication options, and you have a recipe for compromise that modern threat actors love to exploit.

Kerberos, by contrast, brings session tickets, encrypted communications, and strong cryptographic routines. It adds layers of defense that NTLM simply can’t match.

Benefits of NTLM and why do some still use it

Despite its faults, NTLM does offer a few genuine advantages, especially when looking through the lens of legacy support:

  • Compatibility: Keeps older software and operating systems functional in mixed environments
  • Simplicity: Straightforward, low overhead compared to more complex protocols
  • Password protection (to an extent): Ensures the user’s plaintext password is never sent over the wire

But for every advantage, there’s a corresponding risk. Compatibility is what keeps NTLM on life support; it’s also what makes it so dangerous in a modern context.

Disadvantages and security concerns of NTLM

NTLM’s disadvantages have become increasingly critical as attackers grow bolder and more sophisticated.

  • Vulnerable to attack

  • Lack of password salting allows attackers to impersonate users using hashed credentials

  • Susceptible to brute-force and pass-the-hash exploits

  • No support for contemporary security standards

  • No multifactor authentication

  • Can’t harness the latest encryption algorithms

  • Obsolete but hard to terminate

Legacy systems require it, so it continues to have a presence

Think of NTLM as a ramshackle lock on a door. It works, but any determined burglar knows exactly how to force it open.

Frequently asked questions

Yes, but only for backward compatibility. Kerberos remains the default for new Active Directory domains.

It can be, but only if all systems and applications in your network support Kerberos or another secure alternative.

NTLM relies on outdated cryptography, is vulnerable to pass-the-hash attacks, and lacks multifactor authentication support.

Many older Windows systems and some applications require NTLM for network authentication, which is why it persists.

Network audits, monitoring tools, and reviewing system logs can reveal where NTLM authentication attempts occur.

Glitch effectBlurry glitch effect

Strengthen your defenses

If NTLM still lurks in your organization, treat it the way you’d treat an unsecured backdoor. Don’t rely on hope. Make auditing, patching, and ultimately moving away from NTLM a clear security objective. It’s also worth considering investing in security solutions and identity protection strategies tailored for modern threats.

Glitch effect

Related Resources


  • What is Mimikatz?
    What is Mimikatz?
    Learn what Mimikatz is, how it works, and how to detect and defend against its attacks. Protect your network from credential theft and lateral movement.
  • What is Pass the Hash (PtH)?
    What is Pass the Hash (PtH)?
    Learn what a Pass the Hash (PtH) attack is, how threat actors use it to move laterally across networks, and how you can defend against this common technique.
  • What is Kerberos? A Cybersecurity Guide to Secure Authentication Protocols
    What is Kerberos? A Cybersecurity Guide to Secure Authentication Protocols
    Learn how Kerberos works and why it’s essential for secure enterprise authentication strategies. Explore features, uses, and best practices.
  • What Is a Golden Ticket Attack?
    What Is a Golden Ticket Attack?
    Learn how Golden Ticket attacks exploit Kerberos. Discover how they work, why they’re dangerous, and how to prevent them in Active Directory environments.
  • What Is CAPTCHA? Definition, Types & How It Works
    What Is CAPTCHA? Definition, Types & How It Works
    Learn what CAPTCHA is, how it works, its types, vulnerabilities, and future role in cybersecurity. Discover solutions for protecting your systems from bots.
  • What is Password Security Storage?
    What is Password Security Storage?
    Learn how password security storage protects user credentials through hashing, salting, and modern algorithms. Essential cybersecurity knowledge explained.
  • What’s a Rainbow Table Attack—and How Can You Stop It?
    What’s a Rainbow Table Attack—and How Can You Stop It?
    Learn how rainbow table attacks work and why salted hashes are critical to keeping your organization’s passwords safe.
  • What is a Hash Value? Cracking the Code Behind Digital Fingerprints
    What is a Hash Value? Cracking the Code Behind Digital Fingerprints
    Learn what a hash value is, how it works, and why it's essential for cybersecurity. From passwords to file integrity, hashing is your digital fingerprint.
  • What are Domain Admin Groups?
    What are Domain Admin Groups?
    Learn about domain admin groups, their role in Windows Active Directory, and best practices to tighten cybersecurity and prevent unauthorized access.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy