So I’m getting into password cracking with hashcat because of a project at work.
Our new cyber security guy has pointed out how easy it is to get NTLMv2 hashes with current network/AD settings and I want to see how good my default password scheme is that I send out to end users is.
So I wanted to generate some default passwords and encrypt them with NTLMv2 and try to crack them with hashcat and my rig of GPU’s.
Problem stands that I can’t find a Python library thats just plug and play for a
for(string in list y):
NTLMv2.encrypt(string)
nor can I find enough info about how an NTLMv2 hash is created to figure it out.
I’m certain I’ve dove straight into the deep end on this subject, but I really want to practice this a few times with a few Ruleset changes and dictionary changes. I know hashcat offers test ones, but they only have one hash each and its just “hashcat”. I wanna see what my hodge podge of 60 class gpus can do lol.
I’d prefer options in python or c++ but I’m willing to learn another language. Thanks!