Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud
 
 
Go to file
Swissky 88a6eb17f1
Update README.md
2020-12-19 22:38:11 +01:00
.gitignore Initial commit 2020-12-19 21:07:43 +01:00
LICENSE Initial commit 2020-12-19 21:07:43 +01:00
README.md Update README.md 2020-12-19 22:38:11 +01:00

README.md

Nephelees

Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also ntds cracking tool abusing Google Colab

Open In Colab

V1 - Google Colab

Roll for Tesla P100

Go on : https://colab.research.google.com/github/mxrch/penglab/blob/master/penglab.ipynb
Select "Runtime", "Change runtime type", and set "Hardware accelerator" to GPU.
Change the config by setting "True" at tools you want to install.
Select "Runtime" and "Run all" !


Workflow example 3 (OPSEC: crack anonymized hashes)
run the preparation script below
on your local machine, run hashonymize to anonymize your hash lists
upload your anon hashes list on the colab !wget http://yourip:yourport/yourfile
run a hashcat command like this to start cracking !hashcat --status --hash-type 1000 --attack-mode 0 --username DOMAIN.LOCAL.ntds wordlists/rockyou.txt
recover the .pot file from the Google Colab !curl --upload-file ~/.hashcat/hashcat.potfile http://yourip:yourport/
on your local machine, run the following hashcat command with the recovered potfile to match real usernames with cracked password hashcat --potfile-path hashcat.potfile --hash-type 1000 --username DOMAIN.LOCAL.ntds wordlists/rockyou.txt
hashcat -m 1000 --potfile-path ntds.cracked ntds.tocrack --show --username
  • markov, keyboard walking, dico + rules , haveibeenpwn
  • reuse old pot (extract passwd to new wordlist)

V2 - UI

References & Ideas