I have collected different NTLMv2 hashes,
RDP, SMB.
Issue: even if I crack the password, the IP in the log name, doesn't have the ports open, so I can't connect to the machine.. what's the point of those NTLMv2 hashes, they can be accessed only if inside the network? is there any other tool rather than Responder that does a more effective exploitation and provides RCE/shell?
RDP, SMB.
Issue: even if I crack the password, the IP in the log name, doesn't have the ports open, so I can't connect to the machine.. what's the point of those NTLMv2 hashes, they can be accessed only if inside the network? is there any other tool rather than Responder that does a more effective exploitation and provides RCE/shell?