NTLM Type 2 Challenge Decode — autodiscover.almayadeen.net/ews/exchange.asmx ============================================================================= Raw Base64: TlRMTVNTUAACAAAAEgASADgAAAAFgomiEEJCyv02UFIAAAAAAAAAALIAsgBKAAAABgOAJQAAAA9J... Decoded Target Info: Target Name: ITTIHADTV NetBIOS Domain: ITTIHADTV NetBIOS Computer: BHS-EX09 DNS Domain: ITTIHADTV.local DNS Computer: BHS-EX09.ITTIHADTV.local DNS Tree: ITTIHADTV.local Timestamp: 2026-02-28T09:55:05.004823 (server time at moment of probe) Analysis: - Single AD forest: ITTIHADTV.local - Single AD domain: ITTIHADTV.local (no child domains visible) - Server naming: BHS- prefix (OVH Beauharnois datacenter?) - NTLM authentication enabled (allows offline cracking of captured hashes) - Negotiate + NTLM both offered (downgrade attack possible)