Closed Arno0x closed 8 years ago
Yeah, for NTLMv1, Inveigh won't currently go any further than grabbing the challenge/response for cracking. Of course, you will be able to perform many more attempts per second while cracking NTLMv1 vs cracking NTLMv2. So, there is still an advantage on that front.
The relay function is due for a full overhaul. I hope to still add in NTLMv1
Also, depending on your attack/pivot scenario, you may be able to just use the Inveigh spoofer to send traffic to another SMB relay tool that can handle NTLMv1.
Thanks for your answer.
I can confirm using NTLMv1 by directing the traffic to another SMB relay (metasploit smb_relay) works just fine.
Hello,
So far I can capture NTLMv1 challenge/response from HTTP authentication.
What can be done with this challenge/response apart from brute forcing raw password from it ? It seems it can't be used with Invoke-InveighRelay as it only supports NTLMv2 (but still is able to capture NTLMv1 challenge/response).
Thx, Arno