MSCHAPv2 and NTLMv1 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: MSCHAPv2 and NTLMv1 (/thread-7436.html) |
MSCHAPv2 and NTLMv1 - usernet - 04-11-2018 Hi all, this is my first post, i hope the question could be interesting just as much for me as it is for you and that it's not too dumb. I get to the point: implementing an evil-twin attack, in a wpa2-enterprise network, in which my notebook is the authenticator and the authentication server (the AP and the radius server) and where the MSCHAPv2 protocol is used as inner authentication method, I can retrieve an NTLMv1 Hash, an MD4, as suggested in these posts, and as the example picture shows: https://hashcat.net/forum/thread-2563.html https://hashcat.net/forum/thread-5052.html (i'm using hostapd-wpe in a TESTING environment) But, reading the details about the MSCHAPv2 protocol, I cannot explain me how it's possible that I can retrieve this (NTLM) hash; especially, if the protocol uses the NTLM hash, just as a key, to encrypt the challenge hash and do not explicitly send it, to the radius server. From RFC 2759 - "Microsoft PPP CHAP Extensions, Version 2" I found: Quote:Response Packet Quote:8.1. GenerateNTResponse() Quote:8.5. ChallengeResponse( How it's possible that i can retrieve the PasswordHash, instead of trying to obatin it trough the des-encrypted string? Thank you for all your help RE: MSCHAPv2 and NTLMv1 - undeath - 04-11-2018 if you look at the 5500 (netntlmv1) kernel you can see that it does involve DES encryption: https://github.com/hashcat/hashcat/blob/master/OpenCL/m05500_a0.cl however, here is a post about recovering the ntlm hash from the netntlmv1 hash: https://hashcat.net/forum/thread-5912.html RE: MSCHAPv2 and NTLMv1 - usernet - 04-11-2018 (04-11-2018, 10:46 PM)undeath Wrote: however, here is a post about recovering the ntlm hash from the netntlmv1 hash: https://hashcat.net/forum/thread-5912.html Ok now it's more clear thanks a lot In particular I would point out the link reported from the author of the post, that definitively solved my doubts: http://markgamache.blogspot.ca/2013/01/ntlm-challenge-response-is-100-broken.html |