NTLMRawUnHide – A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format

NTLMRawUnHide –  A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format

NTLMRawUnhide.py is a Python3 script designed to parse community packet seize files and extract NTLMv2 hashes in a crackable structure. The resource was designed to extract NTLMv2 hashes from files created by native Home windows binaries like NETSH.EXE and PKTMON.EXE with no conversion.

The adhering to binary community packet seize formats are supported:

  • *.pcap
  • *.pcapng
  • *.cap
  • *.etl

Use

Utilization: NTLMRawUnhide.py -i  [-o <outputfile>] [-f] [-h] [-q] [-v]
Most important selections:
-f, --follow Continually "comply with" (e.g. "study from")
input file for new information
-h, --assist
-i, --enter Binary packet facts input file
(.pcap, .pcapng, .cap, .etl, others?)
-o, --output Output file to document any discovered NTLM
hashes
-q, --peaceful Be a large amount additional silent and only output
observed NTLM hashes. --quiet will also
disable verbose, if specified.
-v, --verbose

Examples

Extract NTLMv2 hashes from illustrations/seize.pcap:

python3 NTLMRawUnhide.py -i illustrations/seize.pcap

Same, but with verbose output:

python3 NTLMRawUnhide.py -i examples/seize.pcap -v

Extract NTLMv2 hashes from examples/capture.pcap and carry on to check the file for new hashes (like tail -f):

python3 NTLMRawUnhide.py -i illustrations/capture.pcap -f

Extract NTLMv2 hashes from illustrations/seize.pcap and publish extracted hashes to /tmp/hashes.txt

python3 NTLMRawUnhide.py -i examples/capture.pcap -o /tmp/hashes.txt

Packet Seize Solutions

To develop a compatible packet capture file, any of the following methods can be made use of:

  • Wireshark:
Established seize filter as "tcp port 445" Save as .pcapng
  • tcpdump
tcpdump -i eth0 -w seize.pcap "port 445"
  • NETSH.EXE
netsh.exe trace start off persistent=of course seize=yes TCP.AnyPort=445 tracefile=C:UsersPubliccapture.etl
netsh.exe trace stop
  • PKTMON.EXE
pktmon.exe filter add SMB -p 445
:: List all filters
pktmon.exe filter record
:: Find id of the community adapter (illustration > Id: 9)
pktmon.exe comp list
:: pktmon.exe start --etw -p -c [Adapter ID]
pktmon.exe start --etw -p -c 9
:: Will make the file PktMon.etl in present listing
pktmon.exe halt
:: Cleanup
pktmon.exe filter clear away

References

The next URL was very helpful when developing this device: The NTLM Authentication Protocol and Safety Assist Company http://davenport.sourceforge.internet/ntlm.html

INprasEuyDM

Image and Posting Resource hyperlink

Read through A lot more on Pentesting Tools

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: