Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/gosecure/burp-ntlm-challenge-decoder

Burp extension to decode NTLM SSP headers and extract domain/host information
https://github.com/gosecure/burp-ntlm-challenge-decoder

burp extension ntlm osint recon security ssp windows

Last synced: 8 days ago
JSON representation

Burp extension to decode NTLM SSP headers and extract domain/host information

Awesome Lists containing this project

README

        

# Burp NTLM Challenge Decoder

[![Build Status](https://travis-ci.org/GoSecure/burp-ntlm-challenge-decoder.svg?branch=master)](https://travis-ci.org/GoSecure/burp-ntlm-challenge-decoder)

![Burp SSP Decoder](/images/version_finale.gif)

Burp extension to decode NTLM SSP headers. NTLM challenges over HTTP allows us to decode interesting information about a server, such as:
- The server's hostname
- The server's operating system
- The server's timestamp
- The domain's name
- The domain's FQDN
- The parent domain's name

# Build the plugin

`$ gradle build`

The compiled plugin is located at `build/libs/burp-ntlm-challenge-decoder.jar`

[Download the precompiled jar](release/burp-ntlm-challenge-decoder.jar)

# Sources, credits

- https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-NLMP/[MS-NLMP].pdf
- http://msdn.microsoft.com/en-us/library/cc236621.aspx
- https://gist.github.com/aseering/829a2270b72345a1dc42