Search

Cracking captured Hashes

We captured an NTLMv2 hash and we want to crack it.

hashcat --help | grep NTLM

we can see that the value would be 5600 for NTLMv2

that means our hashcat command should be:

hashcat -m 5600 hashes.txt rockyou.txt -O

We can also use their wiki for modules:

to show pass if you already cracked:

hashcat -m 5600 hashes.txt rockyou.txt --show

better password list:

rockyou2021 (90 GB)

Rules:

hashcat -m 5600 hashes.txt rockyou.txt -r OneRule

Smart things to think about:

If the company is in or near Pittsburgh, maybe try passwords related to the Pittsburgh football team!