What Does It do?
It’s usage is pretty limited, and is a tool dedicated to one function: Convert John The Ripper format NetNTLM hashes to HashCat compatible format.
I previously have had a requirement to convert multiple NetNTLM JTR hashes to my preferred format for HashCat, and to be honest there wasn’t really any good resources online to help with understanding the hash formatting (let alone the conversion). Thankfully there were one or two that helped, but I figured this would be helpful in doing the conversion en masse.
Also, I like to look for any excuse to brush up on my Python skills.
OK, How Does It Work?
Sure, well you can either use a single-hash entry with the
--hash switches, which when entered will take you into a prompt for the hash (for those who are interested in why I did it this way it was because the bash input kept causing errors with special characters, and this was an easier mitigation than adding a load of escaping nonsense).
You can also use a file to input a mass list of hashes with the
--file switches and will be output to the screen by default. Although you can use the
--output switches to set an output file instead.
John The Ripper:
For the Lazy:
git clone https://github.com/ins1gn1a/NetNTLM2HashCat.git