responder
Cracking NTLMv2 responses captured using responder
In the previous post, a Raspberry Pi Zero was modified to capture hashes (or rather NTLMv2 responses from the client). Let’s see how hashcat can be used to crack these responses to obtain the user password. I will be using dictionary based cracking for this exercise on a Windows