Responder
When Windows connects to a service, it likes to try to authenticate automatically. This can be used to our advantage with a tool like responder.
If we have a payload which causes a connection back to our machine for a windows service (like SMB), we can listen for that and get the NTLM hash for the user attempting to connect:
responder -I [interface] -dPWith the resulting hash, we can use hashcat to attempt to crack it
The mode for NTLM hashes is 1000
The -a 0 flag tells hashcat we're using a wordlist
hashcat -m 1000 -a 0 [hashfile] [wordlist] -OIf we're not having success with any of the normal wordlists and we have lower access already, we can create custom wordlists for our target using rpcclient and crunch.
rpcclient> getdompwinfoThis can give us some basic rules about passwords on this domain - we can use this information to craft a password list with crunch
crunch [min] [max] -o my_wordlist.lstYou can also use the
-roption if you need to resume creating the list-tcan specify patterns:Specifies a pattern, eg: @@god@@@@ where the only the @'s, ,'s, %'s, and ^'s will change. @ will insert lower case characters , will insert upper case characters % will insert numbers ^ will insert symbolslook into the
-foption as well for which charsets to include
Last updated