How to extract NTLM Hashes from Wireshark Captures for cracking with Hashcat

Поделиться
HTML-код
  • Опубликовано: 22 авг 2024

Комментарии • 24

  • @berthold9582
    @berthold9582 2 месяца назад +1

    Très bien expliqué monsieur 🎉

  • @mo.inshasi9049
    @mo.inshasi9049 12 дней назад +1

    prefect , thank you !

  • @samadborz
    @samadborz Месяц назад +1

    Thanks man thats help me a lot ! :) ;)

  • @user-ty3iy8bk2l
    @user-ty3iy8bk2l Год назад +1

    Thanks for showing the packet capture! Awesome! Subbed

    • @embracethered
      @embracethered  Год назад

      Thanks for the comment! Happy to hear the content is useful. 🙂

  • @maloseevanschaba7343
    @maloseevanschaba7343 4 месяца назад +1

    Perfect straight to the point,

  • @novaland.
    @novaland. 2 месяца назад +1

    very useful video thank you very much !

    • @embracethered
      @embracethered  2 месяца назад

      Glad it was helpful! And thanks for watching!

  • @yhytuncer
    @yhytuncer Год назад +1

    Fun times ! You just got another subscriber my
    Friend

  • @rivhaaken9763
    @rivhaaken9763 11 месяцев назад +1

    Underrated! All im sayin.

    • @embracethered
      @embracethered  11 месяцев назад

      Thanks for watching and commenting. Much appreciated! 🙂

  • @vapeboss8161
    @vapeboss8161 Год назад

    Thank you! You are good

  • @plaverty9
    @plaverty9 7 месяцев назад +1

    I just tried this, but the only difference is I was capturing this information over HTTP instead of SMB. Does that make a difference? I ask because I was trying to generate a proof of concept where I controlled the username and password going in, but it wouldn't crack. I tried four different times and it didn't work. Is something different when these are captured over HTTP instead of an SMB connection?

    • @embracethered
      @embracethered  7 месяцев назад

      Good question. First thought is that it should just work the same, but I haven't tried. Relaying def works, that I have done many times in past.

    • @plaverty9
      @plaverty9 7 месяцев назад

      Thanks. I had a colleague try it too, and got the same result as I did. This is for a pentest proof of concept, so I’m not in position to relay unfortunately.

  • @sundowner12449
    @sundowner12449 Год назад +1

    👌👌

  • @SecretCoder-gb9iq
    @SecretCoder-gb9iq 11 месяцев назад

    Sir plz tell me how to extract password from handshake file via wireshark