2023-12-21 21:29:58 +03:00
.TH @MANPAGE_NAME@ 1 2017 -01-11 "@WINPR_VERSION_FULL@" "FreeRDP"
2017-01-11 17:28:18 +03:00
.SH NAME
2023-12-21 21:29:58 +03:00
@MANPAGE_NAME@ \- NTLM hashing tool
2017-01-11 17:28:18 +03:00
.SH SYNOPSIS
2023-12-21 21:29:58 +03:00
.B @MANPAGE_NAME@
2017-01-11 17:28:18 +03:00
\fB -u\fP username
\fB -p\fP password
[\fB -d\fP domain]
[\fB -f\fP { \fI default\fP | sam }]
[\fB -v\fP { \fI 1\fP | 2 }]
.SH DESCRIPTION
2023-12-21 21:29:58 +03:00
.B @MANPAGE_NAME@
2017-01-17 15:25:47 +03:00
is a small utility that can be used to create a NTLM hash from a username and password pair. The created hash can be outputed as plain hash or in SAM format.
2017-01-11 17:28:18 +03:00
.SH OPTIONS
.IP "-u username"
The username to use.
.IP "-p password"
Password to use.
.IP "-d domain"
A optional parameter to specify the domain of the user.
.IP "-f format"
Specify the output format. The \fI default\fP outputs only the plain NTLM
hash. The second output format available is \fI sam\fP which outputs the
created hash in a format that it can be used in SAM file:
user:domain::hash:::
.IP "-v version"
Version allows it to specify the NTLM version to use. The default is to use version 1. In case
version 2 is used a domain needs to be specified.
.SH EXAMPLES
2023-12-21 21:29:58 +03:00
@MANPAGE_NAME@ -u \fI user\fP -p \fI password\fP -d \fI domain\fP -f \fI sam\fP -v \fI 2\fP
2017-01-11 17:28:18 +03:00
Create a version \fI 2\fP NTLM hash for \fI user\fP with \fI domain\fP and \fI password\fP and output it in \fI sam\fP format.
.SH EXIT STATUS
.TP
.B 0
Successful program execution.
.TP
.B 1
Missing or invalid arguments.
.SH AUTHOR
FreeRDP <team@freerdp.com>