Responder
Usage :
Listening requests on the network to actively probing the NTLM hashes on the Active Directory domain
sudo responder -I eth0
Upon capturing requests from the legitimate users probing other devices with the active directory
run (Win+R) --> //CEH-Tools
The hases will be captured on the responder and then we will crack the hases using the hydra & hashcat password cracking tools
Last updated