Are there any ways to leverage NTLM V2 hashes during a penetration test?


+ Leveraging NTLMv2 hashes during a penetration test can be done through several methods, including pass-the-hash attacks and offline cracking techniques. This article outlines these methods in detail.


+ NT LAN Manager (NTLM) is a challenge-response authentication protocol that was introduced with Windows NT 3.1. It is used for authenticating users to servers on an MS-DOS or Windows network, and it is still widely used today. The NTLMv2 hashing algorithm is considered stronger than the original NTLM hashing algorithm, making it more secure. However, it can still be targeted during a penetration test through various techniques.
– Pass-the-Hash Attacks
+ One of the most common ways to leverage NTLMv2 hashes during a penetration test is through pass-the-hash attacks. In this type of attack, an attacker gains access to a target system using valid credentials and then uses the NTLMv2 hash of those credentials to elevate their privileges on other systems within the network.
+ To perform a pass-the-hash attack, the attacker needs to obtain the NTLMv2 hash of a valid user account. This can be done through various methods, such as capturing network traffic or stealing a memory dump from the target system. Once the hash is obtained, the attacker can use tools like Mimikatz or Empire to perform the pass-the-hash attack.
+ Pass-the-hash attacks are effective because they bypass many security controls, such as firewalls and intrusion detection systems. They also allow an attacker to move laterally within a network, which can lead to further compromise.
– Offline Cracking Techniques
+ Another way to leverage NTLMv2 hashes during a penetration test is through offline cracking techniques. In this type of attack, the attacker obtains the NTLMv2 hash of a valid user account and then uses specialized software to crack the hash and obtain the plaintext password.
+ To perform an offline cracking attack, the attacker needs access to the target system or network, as well as the ability to capture NTLMv2 hashes. Once the hashes are obtained, they can be exported to a file and taken offline for cracking. There are several tools available that can perform this task, such as John the Ripper or Hashcat.
+ The success of an offline cracking attack depends on several factors, including the complexity of the password, the length of the password, and the speed of the cracking software. However, even strong passwords can be cracked with enough time and processing power.


+ In conclusion, there are several ways to leverage NTLMv2 hashes during a penetration test, including pass-the-hash attacks and offline cracking techniques. These attacks can be highly effective in compromising networks and obtaining access to sensitive information. To prevent these types of attacks, organizations should implement strong security controls, such as two-factor authentication and network segmentation, and educate their employees on best practices for password management.

Previous Post

Can Client send Application data in TLS 1.2 or earlier before getting server Finished message?

Next Post

Create OpenVPN/easy-rsa certificate from public key only

Related Posts