NTLMv1 Downgrade
Client sends NTLMv1 response when LmCompatibilityLevel exists and is 2 or lower, which can be downgraded to "NTLMv1 w/o SSP" when NtlmMinClientSec is 0x20 or lower:
Property Name
Property Path
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0
Check
Check with PowerShell:
PS > (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\ -Name LmCompatibilityLevel).LmCompatibilityLevel
2
PS > $decValue = (Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\Lsa\MSV1_0\ -Name NtlmMinClientSec).NtlmMinClientSec
PS > $hexValue = "0x" + [string]::Format("{0:x}", $decValue)
PS > $hexValue
0x20Check with Seatbelt (example):
Cmd > .\Seatbelt.exe NTLMSettingsExploit
Authentication CoercionExploit with Responder with a known challenge of 1122334455667788 (see Authentication Coercion to trigger callbacks):
ntlmv1-multi + crack.sh
Calculate the token:
Check the final 2 bytes (4 characters) of the NT hash:
Last updated