Capture an NTLMv2 hash with Responder on a segmented LAN and crack it with Hashcat.
This lab demonstrates how Responder captures NTLMv2 authentication over the network, and how Hashcat can be used to attempt password recovery from the captured hash.
Environment: Windows 10 target and attacker tooling on a segmented lab LAN (to avoid production impact).
Launch Responder on the attack host (e.g., interface eth0
) to poison LLMNR/NetBIOS and await authentication attempts.
From the Windows target, attempt to access a nonexistent host (e.g., \\server01\share
). Responder poisons the broadcast resolution and intercepts the authentication to capture the NTLMv2 hash.
Copy the captured NTLMv2 hash into a text file and run Hashcat with a wordlist to attempt recovery of the plaintext password.