NTLM Hashing and Authentication
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What hash version was passed to Responder?

  • Unknown
  • Version 3 (v3)
  • Version 2 (v2) (correct)
  • Version 1 (v1)

What type of file is created in the example?

  • Password list file
  • v1 file
  • Root file
  • v2 file (correct)

What is used to crack the password in the example?

  • Winexe
  • Responder
  • GitHub
  • John the Ripper (correct)

What is the password that John the Ripper successfully cracks?

<p>vagrant (C)</p> Signup and view all the answers

What ruleset is used with John the Ripper in the example?

<p>KoreLogic ruleset (D)</p> Signup and view all the answers

What can be accessed using the credentials obtained?

<p>The target system remotely (C)</p> Signup and view all the answers

What is Winexe used for?

<p>Remote administration of Windows systems (D)</p> Signup and view all the answers

What can Winexe be used to do on the target system?

<p>Run applications (D)</p> Signup and view all the answers

What is the initial step in getting passwords with Responder?

<p>Running Responder on the Kali Host (D)</p> Signup and view all the answers

What is observed on the Windows system during this process?

<p>Only an 'Access is denied' message (B)</p> Signup and view all the answers

What is obtained from the output on the Kali box?

<p>The IP address and username of the requesting host (D)</p> Signup and view all the answers

What is done with the obtained hash?

<p>It is tried to be cracked to see if it works on the system (C)</p> Signup and view all the answers

Why is CTRL-C pressed on the Responder window?

<p>To stop Responder from running (A)</p> Signup and view all the answers

What is the purpose of dumping hashes out of Responder?

<p>To process them with John the Ripper (D)</p> Signup and view all the answers

What are the two new files generated after dumping hashes out of Responder?

<p>DumpNTLMv1.txt and DumpNTLMv2.txt (B)</p> Signup and view all the answers

What type of hash can be seen on the next slide?

<p>NetNTLMv2 Hash (C)</p> Signup and view all the answers

What was the purpose of creating NetNTLMv1 and NetNTLMv2 hashes?

<p>To make hashes slower to crack (A)</p> Signup and view all the answers

What is used to add randomness to the NTLMv1 hash?

<p>A server-based nonce (A)</p> Signup and view all the answers

What happens when a client connects to a host using NTLMv1?

<p>The client asks for a nonce and then sends the hashed challenge to the server (D)</p> Signup and view all the answers

What is the purpose of the second nonce in NTLMv2?

<p>To add complexity to the hash creation (A)</p> Signup and view all the answers

How does NTLMv2 protect against rainbow tables?

<p>By using two different nonces (B)</p> Signup and view all the answers

What is the purpose of using Responder in capturing hashes?

<p>To answer LLMNR and NBNS queries (A)</p> Signup and view all the answers

Why is using a fixed challenge on the server side beneficial when capturing hashes?

<p>It allows us to deal with one set of randomness instead of two (D)</p> Signup and view all the answers

Where can the latest version of Responder be obtained?

<p>From GitHub (A)</p> Signup and view all the answers

What is the purpose of running the Get-ComputerDetail.ps1 script?

<p>To get computer details (D)</p> Signup and view all the answers

What is needed to perform certain activities on the domain?

<p>A ticket or hash cached in the session (C)</p> Signup and view all the answers

What is the purpose of running the Invoke-Portscan.ps1 script?

<p>To scan a port on the target Windows machine (C)</p> Signup and view all the answers

What is the tool used to spoof LLMNR and NetBIOS Name Services responses?

<p>Responder (C)</p> Signup and view all the answers

What is used to crack credentials?

<p>John the Ripper (C)</p> Signup and view all the answers

What is the purpose of the PowerView.ps1 script?

<p>The purpose is not specified in the text (D)</p> Signup and view all the answers

What is required to perform some activities on the domain?

<p>A full session on the system (D)</p> Signup and view all the answers

What is the purpose of using cmdlets like Invoke-WebRequest and Invoke-Expression?

<p>To bring along our own code over the Internet (C)</p> Signup and view all the answers

What is the main theme of the summary?

<p>Ways to get onto a target system without using an exploit (B)</p> Signup and view all the answers

What are the two ways Evil-WinRM can bring over code?

<p>Scripts and binaries (C)</p> Signup and view all the answers

What does the -s flag specify in Evil-WinRM?

<p>A script directory location (D)</p> Signup and view all the answers

What can be loaded from the script directory in Evil-WinRM?

<p>Any scripts (C)</p> Signup and view all the answers

What happens when we type 'menu' in Evil-WinRM?

<p>It lists all available scripts (C)</p> Signup and view all the answers

What is the purpose of Bypass-4MSI in Evil-WinRM?

<p>To bypass Windows Antimalware Scan Interface (D)</p> Signup and view all the answers

How do you run a script in Evil-WinRM?

<p>By typing the script name and then running 'menu' again (C)</p> Signup and view all the answers

What is included in the tool by default in Evil-WinRM?

<p>Four commands: Dll-Loader, Donut-Loader, Invoke-Binary, and Bypass-4MSI (C)</p> Signup and view all the answers

More Like This

NTLM Authentication Overview
5 questions
Use Quizgecko on...
Browser
Browser