NTLM Hashing and Authentication
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What hash version was passed to Responder?

  • Unknown
  • Version 3 (v3)
  • Version 2 (v2) (correct)
  • Version 1 (v1)
  • What type of file is created in the example?

  • Password list file
  • v1 file
  • Root file
  • v2 file (correct)
  • What is used to crack the password in the example?

  • Winexe
  • Responder
  • GitHub
  • John the Ripper (correct)
  • What is the password that John the Ripper successfully cracks?

    <p>vagrant</p> Signup and view all the answers

    What ruleset is used with John the Ripper in the example?

    <p>KoreLogic ruleset</p> Signup and view all the answers

    What can be accessed using the credentials obtained?

    <p>The target system remotely</p> Signup and view all the answers

    What is Winexe used for?

    <p>Remote administration of Windows systems</p> Signup and view all the answers

    What can Winexe be used to do on the target system?

    <p>Run applications</p> Signup and view all the answers

    What is the initial step in getting passwords with Responder?

    <p>Running Responder on the Kali Host</p> Signup and view all the answers

    What is observed on the Windows system during this process?

    <p>Only an 'Access is denied' message</p> Signup and view all the answers

    What is obtained from the output on the Kali box?

    <p>The IP address and username of the requesting host</p> Signup and view all the answers

    What is done with the obtained hash?

    <p>It is tried to be cracked to see if it works on the system</p> Signup and view all the answers

    Why is CTRL-C pressed on the Responder window?

    <p>To stop Responder from running</p> Signup and view all the answers

    What is the purpose of dumping hashes out of Responder?

    <p>To process them with John the Ripper</p> Signup and view all the answers

    What are the two new files generated after dumping hashes out of Responder?

    <p>DumpNTLMv1.txt and DumpNTLMv2.txt</p> Signup and view all the answers

    What type of hash can be seen on the next slide?

    <p>NetNTLMv2 Hash</p> Signup and view all the answers

    What was the purpose of creating NetNTLMv1 and NetNTLMv2 hashes?

    <p>To make hashes slower to crack</p> Signup and view all the answers

    What is used to add randomness to the NTLMv1 hash?

    <p>A server-based nonce</p> Signup and view all the answers

    What happens when a client connects to a host using NTLMv1?

    <p>The client asks for a nonce and then sends the hashed challenge to the server</p> Signup and view all the answers

    What is the purpose of the second nonce in NTLMv2?

    <p>To add complexity to the hash creation</p> Signup and view all the answers

    How does NTLMv2 protect against rainbow tables?

    <p>By using two different nonces</p> Signup and view all the answers

    What is the purpose of using Responder in capturing hashes?

    <p>To answer LLMNR and NBNS queries</p> Signup and view all the answers

    Why is using a fixed challenge on the server side beneficial when capturing hashes?

    <p>It allows us to deal with one set of randomness instead of two</p> Signup and view all the answers

    Where can the latest version of Responder be obtained?

    <p>From GitHub</p> Signup and view all the answers

    What is the purpose of running the Get-ComputerDetail.ps1 script?

    <p>To get computer details</p> Signup and view all the answers

    What is needed to perform certain activities on the domain?

    <p>A ticket or hash cached in the session</p> Signup and view all the answers

    What is the purpose of running the Invoke-Portscan.ps1 script?

    <p>To scan a port on the target Windows machine</p> Signup and view all the answers

    What is the tool used to spoof LLMNR and NetBIOS Name Services responses?

    <p>Responder</p> Signup and view all the answers

    What is used to crack credentials?

    <p>John the Ripper</p> Signup and view all the answers

    What is the purpose of the PowerView.ps1 script?

    <p>The purpose is not specified in the text</p> Signup and view all the answers

    What is required to perform some activities on the domain?

    <p>A full session on the system</p> Signup and view all the answers

    What is the purpose of using cmdlets like Invoke-WebRequest and Invoke-Expression?

    <p>To bring along our own code over the Internet</p> Signup and view all the answers

    What is the main theme of the summary?

    <p>Ways to get onto a target system without using an exploit</p> Signup and view all the answers

    What are the two ways Evil-WinRM can bring over code?

    <p>Scripts and binaries</p> Signup and view all the answers

    What does the -s flag specify in Evil-WinRM?

    <p>A script directory location</p> Signup and view all the answers

    What can be loaded from the script directory in Evil-WinRM?

    <p>Any scripts</p> Signup and view all the answers

    What happens when we type 'menu' in Evil-WinRM?

    <p>It lists all available scripts</p> Signup and view all the answers

    What is the purpose of Bypass-4MSI in Evil-WinRM?

    <p>To bypass Windows Antimalware Scan Interface</p> Signup and view all the answers

    How do you run a script in Evil-WinRM?

    <p>By typing the script name and then running 'menu' again</p> Signup and view all the answers

    What is included in the tool by default in Evil-WinRM?

    <p>Four commands: Dll-Loader, Donut-Loader, Invoke-Binary, and Bypass-4MSI</p> Signup and view all the answers

    More Like This

    NTLM Authentication Overview
    5 questions
    Use Quizgecko on...
    Browser
    Browser