NTLM

The Windows OS stores hashed user account passwords locally in the SAM (Security Accounts Manager) database.
This can be done by copying the SAM and SYSTEM registry hives from a system.

Authentication and verification of user credentials is facilitated by the Local Security Authority (LSA) or LSASS.


● Windows versions up to Windows Server 2003 utilize two different types of hashes :

! 700



● NTLM

When a user account is created, it is encrypted using the MD4 hashing algorithm, while the original password is disposed of.

● NTLM improves upon LM in the following ways:

But it's still vulnerable to Pass-the-Hash Attacks

Crack NTLM hashes:

if collected via meterpreter the format is like this and doesn't need to be formatted other way:

Administrator:500:aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c:::
bob:1009:aad3b435b51404eeaad3b435b51404ee:5835048ce94ad0564e29a924a03510ef:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

John the ripper