How to install and work on the NTLM-Recon in the Parrot OS
3 min readFeb 27, 2022
- A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when working with a large set of potential IP addresses and domains.
- NTLMRecon is built with flexibility in mind. Need to run recon on a single URL, an IP address, an entire CIDR range or a combination of all of it all put in a single input file? No problem! NTLMRecon got you covered. Read on.
Steps for the installation:
- Open the Parrot OS
- Open the Terminal Emulator
- Use root control
- Clone the repository: git clone https://github.com/sachinkamath/ntlmrecon/
- Access the path of the clone: cd ntlmrecon
- Install virtualenv : pip install virtualenv
- Start a new virtual environment: virtualenv venv
- Activate it with: source venv/bin/activate
- Run the setup file: python setup.py install
- Run ntlmrecon : ntlmrecon --help
Usage Steps:
- Recon on a single URL: $ ntlmrecon --input https://example.com(any target URL) --outfile ntlmrecon.csv
- Recon on a CIDR range or IP address: $ ntlmrecon --input 1.1.1.1/24(any target IP) --outfile ntlmrecon-ranges.csv
- Recon on an input file: $ ntlmrecon --infile /path/to/input/file --outfile ntlmrecon-fromfile.csv