• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells From Above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > Offense > Metasploit Module of the Month – ntlm_info_enumeration

Metasploit Module of the Month – ntlm_info_enumeration

May 30, 2015 By RSM Author

This post will be the first in an ongoing series devoted to covering various modules in the Metasploit Framework and their uses.  We hope that our readers will find this useful, as there are more modules added to the framework each day, as well as some obscure modules which are incredibly valuable.  This entry in the series will examine one of the latter, the ntlm_info_enumeration module.  However, before we dive right in, I think a brief journey through history is in order.

The Dark Ages:

Imagine a primitive penetration tester performing an external pentest who happens to have an OWA server in scope.  Obviously he is going to want to brute force some user accounts there, because who doesn’t like reading emails that don’t belong to them?  One problem he may encounter is that OWA can be configured to require user names to be in the format of AD DOMAIN\USER NAME (i.e. “contoso\bgates”).

owa-login

In this case he could try to guess the domain name, and in some of instances that is easy enough, but guessing certainly isn’t a perfect solution.  Our penetration tester wants to be as successful as possible, but he lacks sophistication and is forced to use crude techniques such as including a short list of possible domains in his brute force attack.  For this reason, many organizations remained unbreached, and much employee email was unread, despite his best efforts.

The Industrial Revolution:

A lot has happened since The Dark Ages, penetration testers have evolved, and the attacks and techniques they employ are more sophisticated.  One of the key advances was the discovery that during the NTLM authentication process, the Active Directory domain and NetBIOS name of the system are disclosed.  Some historians credit coldfusion with the initial discovery of this information, but no definitive evidence has even been identified.  In any case, pentesters are now able to identify the AD domain using a few manual steps.  This is accomplished by first identifying a page that accepts NTLM authentication, and submitting an authentication request.  In the reply, a base64 encoded value contains several pieces of data, including the AD domain.  This technique is demonstrated in the following exclusive images, obtained by The War Room, from this time period:

authenticate  decrypted

While a definite improvement over the past, this is still a very manual technique.  Our pentester would have to spend a considerable amount of time to check a large number of paths on several IP ranges.  As pentesters are historically recognized as lazy, this is still not preferable.

The Information Age:

We now arrive in present day, where everyone on the Internet tells the truth, and vulnerabilities have their own logos.  The modern pentester has no small amount of tools in his repertoire, chief among them is the Metasploit Framework.  Metasploit is a popular tool among those in the industry because it makes accessible things that were previously out of reach.  One of the ways this occurs is through automation.  In fact, modules in the automated “scanner” group are widely regarded as some of the most useful in the entire framework.  One module, specifically the ntlm_info_enumeration module written by kaospunk, automates the process identified during The Industrial Revolution.

msf_module

By leveraging this module, our pentester can tear through ranges of systems at a time, increasing his chances of identifying the information he seeks and thus gaining access to the precious prize of other people’s mail.

Now that history class is over, we can explore this module in a little more detail.  This module allows the pentester to rapidly identify an AD domain, and other information, from an NTLM authentication response.  It supports both manually specifying a path, or testing several included in a default word list.  As an auxiliary module, it is able to test multiple hosts, making this a go to tool when testing a large number of systems.  While the focus in this post has been on using this information to gain access to OWA, other, arguably more alarming, opportunities as possible as well.  Access to a VPN or Citrix system can prove invaluable during a penetration test, and even if OWA doesn’t provide any juicy information it is the perfect platform to phish other employees from.  Hopefully this post has helped you understand the ntlm_info_enumeration module a little bit better, and given you some ideas about how it’s use can improve your ability to target Active Directory authentication externally.

 

Tune in next time for another exciting edition of The Metasploit Module of the Month!

 

RSM Author

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 11.1k views
  • Sophos UTM Home Edition – 3 – The Setup 10.9k views
  • Leveraging MS16-032 with PowerShell Empire 10.1k views
  • Bypassing Gmail’s Malicious Macro Signatures 10k views
  • How to Bypass SEP with Admin Access 9.1k views

Footer

  • Facebook
  • LinkedIn
  • Twitter
  • Tools
  • About
  • RSM US LLP

(312) 634-3400

30 S. Wacker Drive Suite 3300
Chicago, IL 60606

Copyright © 2026 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.