How to install and work on the NTLM-Recon in the Parrot OS

NIKHIL KUMAR GANDLA
3 min readFeb 27, 2022
NTLMRecon — Enumerate Information From NTLM Authentication Enabled Web Endpoints
  • A fast and flexible NTLM reconnaissance tool without external dependencies. Useful to find out information about NTLM endpoints when working with a large set of potential IP addresses and domains.
  • NTLMRecon is built with flexibility in mind. Need to run recon on a single URL, an IP address, an entire CIDR range or a combination of all of it all put in a single input file? No problem! NTLMRecon got you covered. Read on.

Steps for the installation:

  • Open the Parrot OS
  • Open the Terminal Emulator
  • Use root control
  • Access the path of the clone: cd ntlmrecon
  • Install virtualenv : pip install virtualenv
  • Start a new virtual environment: virtualenv venv
  • Activate it with: source venv/bin/activate
  • Run the setup file: python setup.py install
  • Run ntlmrecon : ntlmrecon --help

Usage Steps:

  • Recon on a single URL: $ ntlmrecon --input https://example.com(any target URL) --outfile ntlmrecon.csv
  • Recon on a CIDR range or IP address: $ ntlmrecon --input 1.1.1.1/24(any target IP) --outfile ntlmrecon-ranges.csv
  • Recon on an input file: $ ntlmrecon --infile /path/to/input/file --outfile ntlmrecon-fromfile.csv

You’re done.

Happy Hacking!

--

--