NTLM SSP Authentication
One may have encountered a Basic Authentication when navigating to a certain restricted path on a website.
This explains how an adversary may receive some information about the webserver that runs the application!

Exploitation
- Navigate to a URL protected by a
Basic Authentication

- Send in incorrect credentials (testing used admin:admin) and note the
WWW-Authenticateheader in the response:

- If not already installed in burp - Use NTML Challenge Decoder Extension or NTML-info Extension to aid in the decoding of the value received:
