Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Responder parses broken (uncrackable) NTLMv2 hashes #195

Open
a1rb0rn3 opened this issue Mar 24, 2022 · 1 comment
Open

Responder parses broken (uncrackable) NTLMv2 hashes #195

a1rb0rn3 opened this issue Mar 24, 2022 · 1 comment

Comments

@a1rb0rn3
Copy link

Hi,

in my test setup i am using Responder v3.1.1.0 to capture NTLMv2 Hashes (Options: -d, -w, -P). Unfortunately, some hashes output by Responder are uncrackable (tried both with hashcat and john the ripper). There was already a similar Issue in the past (#94).

During testing i ran Responder and recorded the network traffic with tshark. Responder found a total of 68 hashes, but only 59 are crackable. I currently don't have enough time to find the exact spot in your code that is causing this problem, but i think it's somewhere in your NTLMv2 parser. I found a simple Python script that parses NTLMv2 hashes from a pcap (https://github.com/sinnaj-r/NTLMssp-Extract). Coincidentally, this script extracts exactly 59 hashes, all of which are crackable.

Below you can find the file containing all 68 hashes extracted by Responder. The associated super-secure password is "secret" ;).

hashes.txt

@lgandx
Copy link
Owner

lgandx commented Aug 5, 2022

Hello,
Could you provide a pcap file reproducing this issue?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants