How to decode traffic as NTLM protocol in Wireshark?

12,153

I'm not quite sure which ports NTLMSSP actually uses, but you could try this Lua-script to register the NTLMSSP-dissectors to your custom port.

local tcp_port_table = DissectorTable.get("tcp.port")
local tcp_ntlmssp_dis = tcp_port_table:get_dissector(445)
tcp_port_table:add(6901, tcp_ntlmssp_dis)

Save this to a file - e.g. ntlmssp.lua - and tell Wireshark to load it, e.g.

$ wireshark -X lua_script:ntlmssp.lua -r trace.pcap

You might have to change the port 445 to what's really needed or register additional ports by adding additional lines like tcp_port_table:get_dissector(4711). If you need UDP as well, do the same for UDP.

Share:
12,153

Related videos on Youtube

Jury
Author by

Jury

Updated on September 18, 2022

Comments

  • Jury
    Jury over 1 year

    I'm trying to debug NTLM authentication issue. One of my ideas was to capture the network traffic and look thougth it. In my case NTLM authentication is going over non-stardart port (6901). Of course, Wireshark can't detect it. But there is no NTLM (NTLMSSP) protocol in the list in Decode as menu. I can't do like here.
    Is there a way to ask Wireshark to decode traffic as NTLM?
    Or I need to modify captured traffic, e.g. change TCP port or somehow another?

    • Marki555
      Marki555 almost 9 years
      Wireshark does support NTLM SSP protocol wireshark.org/docs/dfref/n/ntlmssp.html
    • Jury
      Jury almost 9 years
      It supports, but how to decode raw byte traffic as NTLM?
    • Michael Hampton
      Michael Hampton almost 9 years
      Have you got a very old version of Wireshark then?
    • Jury
      Jury almost 9 years
      I checked for updates rigth now again...
  • Doug
    Doug over 6 years
    I have been trying to get this to work, and have not been successful. What is the proper port for NTLMSSP? If this technique works, it doesn't appear its 445, and I've tried a bunch of others.