killchain-compendium/hashes/password_cracking/smb_challenge.md

20 lines
365 B
Markdown

# SMB Response Request
* Network traffic of the SMB handshake is needed
* Fields are
* username
* domain
* server challenge
* ntproofstring
* NTLMv2Response with ommited hex of type like 'ntlmProofStr' at the start
## Usage
* Format the fields
```sh
username::domain:serverChallenge:ntproofstring:NTLMv2Response
```
* Use john to decrypt