• Tutorials
  • Courses
  • Tracks

In an LLMNR-poisoning lab, a victim browses \\10.0.2.7 and your Kali box runs:

Last Updated :
Discuss
Comments

In an LLMNR-poisoning lab, a victim browses \\10.0.2.7 and your Kali box runs:

responder -I eth0 -wdv

You capture an NTLMv2 hash. Which follow-up is most aligned with the attack chain described?

Crack with hashcat -m 5600 using a wordlist

Replay the hash directly to RDP on any host

Convert the hash to Kerberos and use pass-the-ticket

Use -m 0 in hashcat because it’s “MD5 equivalent”

Share your thoughts in the comments