hashcat Forum
Trying to crack NTLMv2 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html)
+--- Thread: Trying to crack NTLMv2 (/thread-5443.html)

Pages: 1 2


Trying to crack NTLMv2 - fonestar - 05-09-2016

So I captured a NTLMv2 hash using embedded UNC from one of my Windows 7 machines using the Metasploit SMB server.

When I try to crack it using -m 1000 and a mask attack knowing the first characters I get an error saying something about the length is wrong and "skipping line"?  Can someone tell me the exact command I should be using to perform a mask attack against NTLMv2 hash?

Thank-you in advance!


RE: Trying to crack NTLMv2 - epixoip - 05-09-2016

NTLMv2 is not -m 1000.


RE: Trying to crack NTLMv2 - fonestar - 05-09-2016

(05-09-2016, 05:47 PM)epixoip Wrote: NTLMv2 is not -m 1000.


-m 0 ?

Thought I tried that one too...


RE: Trying to crack NTLMv2 - epixoip - 05-09-2016

No, -m 0 is MD5. Somebody needs to do some reading.


RE: Trying to crack NTLMv2 - fonestar - 05-09-2016

(05-09-2016, 06:41 PM)epixoip Wrote: No, -m 0 is MD5. Somebody needs to do some reading.

I need to find something to read first!  The only articles I've found regarding NTLM are using -m 0 and -m 1000 as examples.  Everything else is about cracking WPA.


RE: Trying to crack NTLMv2 - epixoip - 05-09-2016

Articles? How about you start by reading --help. Then if you do not understand --help, read the wiki. If you need help interpreting the wiki, read the FAQ. If you're still lost, then post your question on the forums.


RE: Trying to crack NTLMv2 - fonestar - 05-09-2016

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~# hashcat --help | grep -i NTLM
1000 = NTLM
5500 = NetNTLMv1-VANILLA / NetNTLMv1-ESS
5600 = NetNTLMv2

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~# hashcat -m 5500 -a 0 /root/ntlm2.txt /root/rockyou.txt
Initializing hashcat v2.00 with 4 threads and 32mb segment-size...

Skipping line: 5d11f7c6054fe34013ba650090c1fdf3 (line length exception)
Skipping line: 26057f5f47bc03a52066fd60b9e2ffd1 (line length exception)
Skipping line: e6043d86df490079c0a95e0d96428d15 (line length exception)
Skipping line: b684039d6cb4a0e7cb03ccfeefb89715 (line length exception)

root@The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali):~# hashcat -m 5600 -a 0 /root/ntlm2.txt /root/rockyou.txt
Initializing hashcat v2.00 with 4 threads and 32mb segment-size...

Skipping line: 5d11f7c6054fe34013ba650090c1fdf3 (line length exception)
Skipping line: 26057f5f47bc03a52066fd60b9e2ffd1 (line length exception)
Skipping line: e6043d86df490079c0a95e0d96428d15 (line length exception)
Skipping line: b684039d6cb4a0e7cb03ccfeefb89715 (line length exception)


No hashes loaded


RE: Trying to crack NTLMv2 - fonestar - 05-09-2016

Maybe I am the one who should be more specific with my question here. I notice that the format is different under the NTLMv2 examples in the wiki. But this is not how it is being displayed when I run the SMB scanner. What information do I need from the SMB scanner? Is there a simple way to dump it in the correct format?


RE: Trying to crack NTLMv2 - epixoip - 05-09-2016

I have no idea what "SMB scanner" is, I think most people use https://github.com/SpiderLabs/Responder


RE: Trying to crack NTLMv2 - fonestar - 05-09-2016

Okay thank-you, I was using "msfconsole auxillary/server/scanner/smb" to capture the challenge but the output appears in a different format than is displayed in the wiki. I will check out Responder.