Identify the accounts most vulnerable to dictionary attacks
-
Updated
Aug 6, 2024 - PowerShell
Identify the accounts most vulnerable to dictionary attacks
Having the NTLM and a cracked LM hash it is possible to get the original password by testing all the combinations of upper and lowercases. This is useful if a ntds.dit file has both NTLM and LM hashes
Active Directory Post Exploitation
Script to crack the SAM file --- NTLM hash comparison
Add a description, image, and links to the ntlm-hash topic page so that developers can more easily learn about it.
To associate your repository with the ntlm-hash topic, visit your repo's landing page and select "manage topics."