
Sign up to save your podcasts
Or


Today we talk about an awesome path to internal network pentest pwnage using downgraded authentication from a domain controller, a tool called ntlmv1-multi, and a boatload of cloud-cracking power on the cheap from vast.ai. Here's my chicken scratch notes for how to take the downgraded authentication hash capture (using Responder.py -I eth0 --lm) and eventually tweeze out the NTLM hash of the domain controller (see https://7ms.us for full show notes).
By Brian Johnson4.7
6868 ratings
Today we talk about an awesome path to internal network pentest pwnage using downgraded authentication from a domain controller, a tool called ntlmv1-multi, and a boatload of cloud-cracking power on the cheap from vast.ai. Here's my chicken scratch notes for how to take the downgraded authentication hash capture (using Responder.py -I eth0 --lm) and eventually tweeze out the NTLM hash of the domain controller (see https://7ms.us for full show notes).

184 Listeners

2,001 Listeners

369 Listeners

373 Listeners

637 Listeners

1,017 Listeners

322 Listeners

416 Listeners

7,999 Listeners

175 Listeners

314 Listeners

188 Listeners

73 Listeners

134 Listeners

44 Listeners