NTLM Hash Types

There are many different hashing algorithms that exist, but it's good to know the hash types that you are likely to see within Active Directory.

Depending on the hash type, you can either attempt lateral movement or attempt to crack the password hash. Having knowledge of these hash types can help you prioritize what where different password hashes are used, and which ones are weaker/easier to crack in a brute-force attack.

For more information on Kerberos Authentication, check out Kerberos for a high-level overview.

NTLM (NT LAN Manager)

The NT Hash, commonly referred to as a NTLM hash, is used the NTLM authentication protocol and is used for verifying user credentials during the authentication process. It relies on a server-challenge mechanism.

  1. The plaintext is converted to UTF-16 to ensure consistent character representation (If the Unicode is not a multiple of 16 bytes, null bytes (0x00) are added)

  2. The server sends the client a random 8-byte challenge value, which is combined with the 16-byte password to create a 24-byte value

  3. The 24-byte value is hashed using the MD4 hashing algorithm which creates a 16-byte value, the first 8-bytes being the LM Hash and the second 8-bytes being the NT Hash

Due to the low complexity of the MD4 hashing algorithm, NTLM hashes are considered insecure.

Example NT Hash: 8846F7EAEE8FB117AD06BDD830B7586C NT/NTLM password hashes can be used in a Pass-The-Hash attack

Last updated