So I captured a NTLMv2 hash using embedded UNC from one of my Windows 7 machines using the Metasploit SMB server.
When I try to crack it using -m 1000 and a mask attack knowing the first characters I get an error saying something about the length is wrong and "skipping line"? Can someone tell me the exact command I should be using to perform a mask attack against NTLMv2 hash?
Thank-you in advance!
When I try to crack it using -m 1000 and a mask attack knowing the first characters I get an error saying something about the length is wrong and "skipping line"? Can someone tell me the exact command I should be using to perform a mask attack against NTLMv2 hash?
Thank-you in advance!