Those are NTLMv2 hashes. The ONLY way to use those is by cracking them. You need to use John the ripper or hashcat (or any other cracking software) and either bruteforce them or doing a dictionary attack. I don't know how this attack works, but if you are able to reuse it to grab the NTLMv1 hashes from memory, you don't even need to crack them, and can pass the hash to login.
Hello, I assume you are asking about domain joined computers. Most domain joined computers will allow users to login using locally even without a network connection (like when the user is travelling or on an airplane). Most likely will work.
How are the hashes useful? I wanna demo this to my friends but don't know how to decode the hashes. Please help
Those are NTLMv2 hashes. The ONLY way to use those is by cracking them. You need to use John the ripper or hashcat (or any other cracking software) and either bruteforce them or doing a dictionary attack.
I don't know how this attack works, but if you are able to reuse it to grab the NTLMv1 hashes from memory, you don't even need to crack them, and can pass the hash to login.
Hey brother how do I contact you
how to reach you ??
I am having trouble with the dependencies. They keep deleting do you think you could help?
ditto
they are supposed to be installing\installed but are not.
does this work with microsoft account computers?
Hello, I assume you are asking about domain joined computers. Most domain joined computers will allow users to login using locally even without a network connection (like when the user is travelling or on an airplane). Most likely will work.
@@ciscolivesecurityfan1136 I took his question as using something like using your 365 account to log in or using Windows Hello
@@tenkei000 Oh, I see what you mean. I don't believe this will work with Office 365 accounts or Windows Hello. Something new to test and break!
@@ciscolivesecurityfan1136 yes, i was talking about microsoft online accounts.