Documentation ¶
Overview ¶
Command ntlmv2-hash computes Microsoft Window NT LAN Manager (NTLM) protocol v2 hashes of passwords.
The output is password-equivalent and must be guarded just as well as the original password.
Example interactive use
$ ntlmv2-hash foo (user input) AC8E657F83DF82BEEA5D43BDAF7800CC (program output) # copy-paste the output $ pdbedit --user jdoe --set-nt-hash AC8E657F83DF82BEEA5D43BDAF7800CC
Using a password prompting helper
$ ssh-askpass 'New samba password' | ntlmv2-hash
Example batch use
$ ntlmv2-hash <password >secret # transport secret to destination host $ read hash <secret $ pdbedit --user jdoe --set-nt-hash "$hash" --account-control '[]'
Click to show internal directories.
Click to hide internal directories.