Running Inveigh in PowerShell¶
-
Load the Inveigh module into PowerShell:
-
Check available parameters for the
Invoke-Inveigh
cmdlet:
-
Run Inveigh to start spoofing LLMNR and NBNS requests, with console and file output enabled:
Using InveighZero (C# Version)¶
-
Run the C# version of Inveigh:
-
Enter the interactive console: Press
ESC
to switch to interactive mode. -
Use the following commands within the console for specific information:
-
Get one captured NTLMv2 hash per user:
-
Get usernames and source IPs/hostnames:
Step-by-Step Attack Execution¶
-
Start Inveigh with default settings:
-
Use the console commands to view captured hashes and usernames.
-
Captured hashes are saved in the specified output directory. By default, they are stored in:
-
Prepare hashes for cracking. Ensure they are in a format compatible with Hashcat.
-
Crack the hashes with Hashcat: