NTLM¶
Section [NTLM]¶
- NTLM.Challenge: HexStr | str = "1337LEET"¶
Linked to
config.SessionConfig.ntlm_challengeSpecifies the NTLM challenge value to use during authentication. The value must be exactly
8characters in length and can be provided as a hexadecimal string or a plain ASCII string.If this option is omitted (i.e., commented out in the configuration), a random challenge will be generated at startup.
NetBIOS Session Service SMB2 (Server Message Block Protocol version 2) SMB2 Header [...] Session Setup Response (0x01) StructureSize: 0x0009 Session Flags: 0x0000 Blob Offset: 0x00000048 Blob Length: 201 Security Blob [...]: GSS-API Generic Security Service Application Program Interface Simple Protected Negotiation negTokenTarg negResult: accept-incomplete (1) supportedMech: 1.3.6.1.4.1.311.2.2.10 (NTLMSSP - Microsoft NTLM Security Support Provider) NTLM Secure Service Provider NTLMSSP identifier: NTLMSSP NTLM Message Type: NTLMSSP_CHALLENGE (0x00000002) Target Name: WORKGROUP [...] Negotiate Flags: 0xe28a0217 NTLM Server Challenge: 74d6b7f11d68baa2 Reserved: 0000000000000000 Target Info Version 255.255 (Build 65535); NTLM Current Revision 255
- NTLM.ExtendedSessionSecurity: bool = true¶
Linked to
config.SessionConfig.ntlm_essEnable Extended Session Security (ESS) for NTLM authentication. ESS results in NTLMv1/v2-SSP hashes instead of regular NTLMv1/v2 hashes.
Default Configuration¶
NTLM configuration section (default values)¶
1[NTLM]
2Challenge = "1337LEET"
3ExtendedSessionSecurity = true