hashmuncher

command module
v1.0.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 6, 2023 License: MIT Imports: 18 Imported by: 0

README

Hash Muncher

Grab NetNTLMv2 hashes using ETW with administrative rights on Windows

GitHub all releases GitHub Workflow Status

  • Uses Event Tracing for Windows (ETW) to get access to raw packet data for SMB authentication packets
  • Decodes NTLM message types 2 and 3
  • Outputs to stdout
  • Press Ctrl-C to stop processing
  • Crack hashes with HashCat using -m 5600

Getting Hash Muncher

Download auto built binaries from releases
Build and install on Windows with this Go command
go install github.com/lkarlslund/hashmuncher@latest
Cross compile the Windows binaries on any Golang supported platforms with PowerShell installed
git clone https://github.com/lkarlslund/hashmuncher
cd hashmuncher
./build.ps1

Usage

hashmuncher.exe [-output filename.txt] [-timeout nnn] [-tracename yourname] [-help]

Now wait for someone to authenticate against your machine. There are various techniques for this but SCF and LNK files with icons pointing to your machine is a popular way. Press Ctrl-C when you're done, copy output to a text file and run HashCat.

Detection

  • No idea, please leave feedback

Mitigation

History

I've been playing with ETW on and off, but once I saw the very cool research from Nettitude Labs I knew I had to make this into an easy to use tool in my favourite language Golang! Nettitude Labs has a working POC written in C# running under the .Net framework, and might be a better option for you. So I'm not really inventing anything here, just adding this as an alternative.

If you like Windows security stuff you might also like my attack graph tool Adalanche

Documentation

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL