team-logo
Published on

swampCTF 2025 - MuddyWater

Authors

Step 1: Research & Traffic Analysis

Objective

Bruteforcing a login for our Domain Controller

Analysis

Upon inspecting the traffic, I noticed SMB authentication attempts, which indicated a possible avenue for exploitation. After researching possible attacks, I determined that an NTLM Relay Attack would be the best fit.

Filtering Traffic

To isolate relevant authentication attempts, I used the following Wireshark filter:

ip.dst_host == 192.168.122.1 && smb2.auth_frame && !(smb2.nt_status == 0xc0000016 || smb2.nt_status == 0xc000006d)
1

Etracting NTLM Authentication Data

  1. Identified an interesting Session Setup Response packet (Packet #3).
  2. Followed the TCP Stream (tcp.stream eq 6670) to view the full exchange.
  3. Exported the specified packet for further processing.
2

Step 2: NTLM Relay Attack

Tool: https://github.com/mlgualtieri/NTLMRawUnHide

With the extracted traffic, I used NTLMRawUnhide.py to extract the NTLMv2 hash:

python3 NTLMRawUnhide.py -i new.pcap
3

Cracking the Hash

After obtaining the NTLMv2 hash, I referenced this NTLMv2 cracking method and proceeded with hashcat:

hashcat -m 5600 -a 0 -o cracked.txt new.txt /usr/share/wordlists/rockyou.txt

Flag:

swampCTF{hackbackzip:pikeplace}