If the target network uses the NTLM protocol to verify the user’s access rights, you need to set up an NTLM authentication object. The protocol requires a user to be authenticated by providing a username and a corresponding password. After the user’s log-in credentials are recognized, the network can then check access rights and allow the user to enter.
This topic describes only how to fill in fields specific for NTLM authentication (the Setup tab). For general steps, see Creating Authentication.
Therefore, you can grant Bright access to an NTLM authenticated network you are going to use for a scan by providing your credentials, workstation name, and the network domain.
If using a Repeater, add
--experimental-connection-reuseflag to keep an open connection between a Repeater and the target. To learn more about Command Language Syntax, see the article.
From the Authentication type dropdown list, select NTLM authentication, and then proceed to the authentication details.
In this section, set up a valid authentication request to be sent to the end-point API by completing the provided fields.
|Username||Enter the NTLM username.|
|Password||Enter the NTLM password.|
|Domain||Enter the domain of the NTLM network you need to get access to.|
|Workstation||Enter your workstation name, for example, a computer name. The maximum length of a workstation name is 64 characters.|
Bright allows testing a scan before saving it. For details, see the Testing Authentication.
Updated 2 months ago