NTLMRawUnHide: parse network packet capture files and extract NTLMv2 hashes
NTLMRawUnhide.py
NTLMRawUnhide.py is a Python3 script designed to parse network packet capture files and extract NTLMv2 hashes in a crackable format. The tool was developed to extract NTLMv2 hashes from files generated by native Windows binaries like NETSH.EXE and PKTMON.EXE without conversion.
The following binary network packet capture formats are supported:
- *.pcap
- *.pcapng
- *.cap
- *.etl
Download
git clone https://github.com/mlgualtieri/NTLMRawUnHide.git
Use
Examples
Extract NTLMv2 hashes from examples/capture.pcap:
python3 NTLMRawUnhide.py -i examples/capture.pcap
Same, but with verbose output:
python3 NTLMRawUnhide.py -i examples/capture.pcap -v
Extract NTLMv2 hashes from examples/capture.pcap and continue to monitor the file for new hashes (like tail -f):
python3 NTLMRawUnhide.py -i examples/capture.pcap -f
Extract NTLMv2 hashes from examples/capture.pcap and write extracted hashes to /tmp/hashes.txt
python3 NTLMRawUnhide.py -i examples/capture.pcap -o /tmp/hashes.txt
Packet Capture Methods
To create a compatible packet capture file, any of the following methods can be used:
- Wireshark:
- tcpdump
- NETSH.EXE
- PKTMON.EXE
Copyright (c) 2020 Mike Gualtieri