PRIMARY CATEGORY β†’ WINDOWS CREDENTIALS

Hashcat Modes

HASHENCRYPTION TYPEHASHCAT MODE
NTLMRC4-HMAC1000
Net-NTLMv2HMAC-MD55600
DCC2PBKDF2-HMAC-SHA12100
AES128AES128-CTS-HMAC-SHA1-9628800
AES256AES256-CTS-HMAC-SHA1-9628900

NT Hashes

Hashcat

Hashcat Type β†’ 1000

hashcat --force -O --user --hash-type 1000 <OUTPUT_FILE>.hash <WORDLIST>
hashcat --force -O --user --hash-type 1000 <OUTPUT_FILE>.hash <WORDLIST> --show

Net-NTLMv2 Response

Hashcat

Hashcat Type 5600

hashcat --force -0 --attack-mode 0 --hash-type 5600 <output_file>.hash <wordlist>
hashcat --force -0 --attack-mode 0 --hash-type 5600 <output_file>.hash <wordlist> --show

Kerberos EKeys

Reference

HASHENCRYPTION TYPEKERBEROS ETYPEHASHCAT MODE
Hash NTLMRC4-HMAC231000
AES128AES128-CTS-HMAC-SHA1-961728800
AES256AES256-CTS-HMAC-SHA1-961828900
Hashcat
AES-128

Hashcat Type β†’ 28800

The hash must have the following format in order to be able to crack it

$krb5db$17$<PRINCIPAL>$<REALM>$<AES-128_KEY>

To crack this hash β†’

hashcat --force -O --attack-mode 0 --hash-type 28800 <AES128_HASH> <WORDLIST>
AES-256

Hashcat Type β†’ 28900

The hash must have the following format in order to be able to crack it

$krb5db$18$<PRINCIPAL>$<REALM>$<AES-256_KEY>

To crack this hash β†’

hashcat --force -O --attack-mode 0 --hash-type 28900 <AES256_HASH> <WORDLIST>

DCC2 Hashes

Domain Cached Credentials 2

Theory

It is stored within HKLM:\SECURITY\Cache when a client logs in with a domain user account on a domain-joined computer

This hash is the result of applying a PBKDF2-HMAC-SHA1 function on the concatenation of the NTLM Hash of the username and the user name itself

PBKDF2-HMAC-SHA1(
  key = NTLM_hash + username_utf16le,
  salt = username_lower_utf16le,
  iterations = 10240,
  key_length = 16 bytes
)
$DCC2$10240#<USERNAME>#23d97555681813db79b2ade4b4a6ff25

It is encrypted using the SYSTEM’s Bootkey as the symmetric key before being stored in the HKLM:\SECURITY\Cache hive

Hashcat

Hashcat

Hashcat Type β†’ 2100

hashcat --force -O --attack-mode 0 --hash-type 2100 <HASH> <WORDLIST>
hashcat --force -O --attack-mode 0 --hash-type 2100 <HASH> <WORDLIST> --show
John the Ripper

John the Ripper

JtR Format β†’ mscash2

john --format=mscash2 --wordlist=<WORDLIST> <HASH>

Resources

Kerberos ETypes