Tips
NTLM cracking with --remove
cat .\hash.txt | .\cut.exe -d ":" "-f1,4" | Out-File -FilePath ntlm.txt -Encoding utf8Script sort cracked NTLM
python3 script_passwords.py hashes.txt cracked.txt
#!/usr/bin/env python
import sys
print("---start process---")
file_hashes = sys.argv[1]
file_cracked = sys.argv[2]
with open(file_hashes) as f:
hashes = [line.rstrip() for line in f]
with open(file_cracked) as f:
cracked = [line.rstrip() for line in f]
f = open("output.txt", "w")
for hash in hashes:
for crack in cracked:
a=crack.split(":")
if a[0] in hash:
f.write(crack)
f.write("\n")
f.close()The ouput.txt file is generated with all the NTLM hashes, including repetitions.
Finally, the top of the passwords can be see:

Create customized dic from rockyou
Password Profiling / Skweez && CEWL
Chartset custom hashcat

Hashcat methodology cracking
Cracking wordlist based
Cracking with Rules
Hybrid cracking: Wordlist + mask && mask + Wordlist.
Brute-force cracking: ?sTarget?s?d?d?d?d (incremental 7 - 15)
Pure brute-force with chartset: (3) ?l?u ?3?3?3?3?3?3?3

Download via Password Profiling / Skweez && CEWL target dic and use it with rules
Create target dir via Create customized dic from rockyou
BONUS: use the cracked passwords, and add it to the wordlists and crack the NOTFOUND hashes again with rules ;)
Password analysis (Active Directory)

Bonus: run powershell script to get target groups ;)
Via BloodHound or Neo4J
The Neo4J output can be exported as CSV: user,group.
The following script generates group files with target users. We just need to execute it:
NTDS Active Users
By getting the NTDS file, we can exfiltrate the active users from neo4j database, and get a new NTDS file with just the active users. For this, we can use the following script.
AD_Miner
AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses.

BONUS
Last updated
Was this helpful?