NTLM
NT / LM Hashes
Calculate NTLM
With Python:
>>> import hashlib
>>> hashlib.new('md4', 'Passw0rd!'.encode('utf-16le')).hexdigest()With Pypykatz:
$ pypykatz crypto nt 'Passw0rd!'Responder Capture Structure
Andrei Miroshnikov. Windows Security Monitoring: Scenarios and Patterns, Part III, pp. 330-333.
[SMB] NTLMv1 Hash and [SMB] NTLMv1-SSP Hash capture structure:
<Username>:<Domain>:<LMv1_Response>:<NTv1_Response>:<Server_Challenge>[SMB] NTLMv2-SSP Hash capture structure:
Capture NTLM on Windows
DivertTCPconn
Divert incoming SMB traffic on Victim to Victim's local port 8445, sent it through a reverse-forwarded port (meterpreter session must be elevated) to Attacker's local 445 port and capture the hashes with Responder:
StreamDivert
Divert all inbound TCP connections to port 445 (SMB) coming from 192.168.1.11 to 10.10.13.37 port 445:
Last updated