Solution at the last.....
Initial inspection:
filter with smb2 protocol.
Look for packet info column where it is written that, Session Setup Request, NTLMSSP_AUTH, User: JUPITER\Administrator. (domain name\username is variable)
expand the packet. you will get session id: 0x00000000b06d3ffe
and session key: b35056d4bb7f4382ee7aabd0f055bad0
Now navigate to edit > preferences > protocols > smb2 > edit
Now input as follows:
session id:
00000000b06d3ffe
session key:
b35056d4bb7f4382ee7aabd0f055bad0
after clicking OK you may notice that smb3 packets are still encrypted. But in the packets some changes has come.
https://github.com/mlgualtieri/NTLMRawUnHide
git clone https://github.com/mlgualtieri/NTLMRawUnHide.git
python3 NTLMRawUnHide/NTLMRawUnHide.py -i stolen.pcapng
It will recover very quickly NTLMv2 hash.
Now crack this using hashcat or john the ripper.
Now navigate to edit > preferences > protocols > NTLMSSP > put the cracked password in the NT Password field. Now see the packets decrypted or not.
Solution:
https://wiki.samba.org/index.php/Wireshark_Decryption
The other way, is to specify the keytab in Preferences -> Protocols -> KRB5 -> click check mark on "Try to decrypt Kerberos blobs"
Now you should decrypt the smb3 packets.
Avi
Comments
Post a Comment