Author Topic: Capturing NTLM hashes  (Read 3403 times)

0 Members and 1 Guest are viewing this topic.

Offline m@dz3r0ne

  • /dev/null
  • *
  • Posts: 6
  • Cookies: 0
    • View Profile
Capturing NTLM hashes
« on: September 29, 2012, 02:26:33 pm »
Need some help! I have an issue! I am trying to capture NTLM hashes from the network. This is what I want to achieve..
I want with wireshark or cain sniff the network for Active directory handshakes. In somehow capture the NTLM hashes when the user is authenticated against Microsoft Active directory. I am trying to accomplish it with wireshark and I am filtering the traffic using smb, ldap and ntlmssp filters and I have reached a point where the frames contain data that looks like hashes but I am not sure. I tried with l0phtcrack and after hours nothing has been captured. I am trying with cain by enabling NTLM downgrade, challenge spoofing reset and challenge spoofing but with no result, nothing has been captured. When I try all the above (wireshark, cain etc) during sniffing I connect to various shared folders, remote desktops and computers that belongs to active directory. I believe that with wireshark I am pretty close but cant tell for sure.

Can anyone help or point me in the right direction?

I noticed that when I connect from a linux machine to a windows shared folder cain captures the hash!
???????
« Last Edit: September 29, 2012, 03:37:52 pm by m@dz3r0ne »
everything is simple. if you look at it from another angle.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Capturing NTLM hashes
« Reply #1 on: September 29, 2012, 04:35:51 pm »
Wireshark is very wrong for this kind of thing. Wireshark sniffs traffic that goes in and out to the network in your localhost (your computer), and not the whole network. You would need Cain for this which apperently you have used.
Try with Ettercap if you know how to use Linux.

Offline m@dz3r0ne

  • /dev/null
  • *
  • Posts: 6
  • Cookies: 0
    • View Profile
Re: Capturing NTLM hashes
« Reply #2 on: September 29, 2012, 04:52:02 pm »
I have already tried ettercap! No capture. It captures everything else but no lm or ntlm hash.
everything is simple. if you look at it from another angle.