Responder

Usage :

  • Listening requests on the network to actively probing the NTLM hashes on the Active Directory domain

sudo responder -I eth0
  • Upon capturing requests from the legitimate users probing other devices with the active directory

run (Win+R) --> //CEH-Tools
  • The hases will be captured on the responder and then we will crack the hases using the hydra & hashcat password cracking tools

HydraHashcat

Last updated