Using LM/NTLM hash authentication
Nexpose can pass LM and NTLM hashes for authentication on target Windows or Linux CIFS/SMB services. With this method, known as “pass the hash,” it is unnecessary to “crack” the password hash to gain access to the service.
Several tools are available for extracting hashes from Windows servers. One solution is Metasploit, which allows automated retrieval of hashes. For information about Metasploit, go to www.rapid7.com.
When you have the hashes available, take the following steps:
If you want to add credentials while configuring a new site, click the Create site button on the Home page. OR Click the Create tab at the top of the page and then select Site from the drop-down list.
If you want to add credentials for an existing site, click that site's Edit icon in the Sites table on the Home page.
- Select Authentication.
- Click Add Credentials.
- In the Add Credentials form, enter a name and description for a new set of credentials if necessary.
- Click Account under Add Credentials.
- Select Microsoft Windows/Samba LM/NTLM Hash (SMB/CIFS) from the Service drop-down list.
- (Optional) Enter the appropriate domain.
- Enter a user name.
- Enter or paste in the LM hash followed by a colon (:) and then the NTLM hash. Make sure there are no spaces in the entry. The following example includes hashes for the password test:
- Alternatively, using the NTLM hash alone is acceptable as most servers disregard the LM response:
- When you have finished configuring the credentials, click Create if it is a new set or Save if it is a previously created set.