mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-21 20:23:18 +00:00
commit
6390baa7f7
1 changed files with 1 additions and 1 deletions
|
@ -194,7 +194,7 @@ The **challenge length is 8 bytes** and **2 responses are sent**: One is **24 by
|
||||||
|
|
||||||
The **second response** is created using **several values** (a new client challenge, a **timestamp** to avoid **replay attacks**...)
|
The **second response** is created using **several values** (a new client challenge, a **timestamp** to avoid **replay attacks**...)
|
||||||
|
|
||||||
If you have a **pcap that has captured a successful authentication process**, you can follow this guide to get the domain, username , challenge and response and try to creak the password: [https://research.801labs.org/cracking-an-ntlmv2-hash/](https://research.801labs.org/cracking-an-ntlmv2-hash/)
|
If you have a **pcap that has captured a successful authentication process**, you can follow this guide to get the domain, username , challenge and response and try to creak the password: [https://research.801labs.org/cracking-an-ntlmv2-hash/](https://www.801labs.org/research-portal/post/cracking-an-ntlmv2-hash/)
|
||||||
|
|
||||||
## Pass-the-Hash
|
## Pass-the-Hash
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue