Categories
Welcome Center
Education & Development
Discussions
Certification Preparation
Recent Posts
Groups
Free Resources
Ebooks
Free Workshops
Trending Certifications Infographic
Infosec Training
IT & Security Training
Live Boot Camps
Security Awareness Training
About Infosec Institute
Home
Discussions
Off Topic
Auditing NTLM passwords?
wes allen
Hey, what procedures are you all using in regards to auditing NTLM passwords for compliance? I have done some password cracking and I have a couple python scripts to help do some analysis, but I am struggling with the easiest, repeatable by less technical people, way to mange the process end to end. Something like the way L0pht worked in the LM days, but that just isn't able to crack NTLM hashes anywhere near as fast or as successful as something like hashcat. So, need to end up with plaintext passwords that I can check for compliance, then match the non-compliant ones back up with a user, and then match the user to an email for notification. So, totally doable with some python and cat|cut|grep shell scripting, but that just seems overly complicated, and I feel like I am trying to reinvent the wheel.
Find more posts tagged with
Save $250 on 2025 certification boot camps from Infosec!
Book now with code EOY2025
Button
Comments
NovaHax
Although NTLM addressed a lot of the shortcomings of the LM hash...it still doesn't employ any salting technique and so the best technique by far, for auditing them, is rainbow tables. You can find some pretty healthy rainbow tables available for download (I've seen some upwards of 10 terabytes)...
wes allen
Thanks much for the reply.
I looked into the rainbow tables, but even just the 8 character mixed alpha, num, symbol, ntlm rainbow tables are almost a TB, and it takes forever to try to run a rainbow table attack with those sizes with l0pht. I can do the cracking part well enough with hashcat, even without a gpu, and do the high level stats fine, it is all the user notifying I am looking for a better way to do, along with making the process simple enough for a less technical person to run.
Quick Links
All Categories
Recent Posts
Activity
Unanswered
Groups
Best Of
INFOSEC Boot Camps
$250
OFF
Use code
EOY2025
to receive $250 off your 2025 certification boot camp!
BROWSE BOOT CAMPS