12-04-2019, 12:18 AM
(12-03-2019, 03:43 PM)slyexe Wrote: https://hashcat.net/wiki/doku.php?id=example_hashes
Or just test an attack on the hash using -m 5500 and see if it works.
The hash is 32 characters and thus is not a -m 5500 hash.. I'll explain the steps I took using hashes from the example_hashes page to stick to the rules..
First, I got a challenge/response via WPA2 Enterprise attacking method..
Then, I submitted the hash to crack.sh page and they replied (success) with what they called a "key".. The key is 32 chars length and ends with the four characters (e.x. 5a5a).. Those four characters were familiar to me because I saw them as PT3 when I used chapcrack..
Question 1: is key == final NTLM hash to be used for PTH?
Hope this clarifies it because it's already clear to me that crack.sh "key" is not a NetNTLMv1 hash but it is not clear to me whether or not further steps should be taken to make this key usable. By further steps I mean something like this: https://github.com/hashcat/hashcat-utils...to_ntlm.pl