Info
The Windows family of operating systems uses multiple hash algorithms to store / transmit user passwords.
It is important to understand each type of hash algorithms so that if hashes are retrieved (e.g. during a penetration test), they can be cracked.
What you will learn
After completing this scenario you will learn the differences between each type of hash algorithms used by the Windows family of operating systems and when they are used.
Technical Details
This scenario can be completed without the use of a virtual machine.
You will need john the ripper or hashcat installed (included in Kali Linux): https://www.openwall.com/john/ https://hashcat.net/hashcat/
Pre-Reading
https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4
- MODESINGLEPLAYER
- TYPECCL
- DIFFICULTYEASY
- TIME60 MINUTES
- COST10 CRYSTALS